Useful Links
Computer Science
Cybersecurity
Cryptography
1. Foundations of Cryptography
2. Mathematical Foundations
3. Symmetric Key Cryptography
4. Asymmetric Key Cryptography
5. Cryptographic Hash Functions
6. Message Authentication and Integrity
7. Key Management and Distribution
8. Cryptanalysis and Security Analysis
9. Applied Cryptography and Security Protocols
10. Advanced Cryptographic Concepts
11. Cryptographic Standards and Compliance
Message Authentication and Integrity
Message Authentication Codes
MAC Properties
Authentication Assurance
Integrity Protection
Key Dependency
MAC Security Requirements
Existential Unforgeability
Chosen Message Attacks
Key Recovery Resistance
MAC Construction Methods
Hash-based MACs
HMAC Algorithm
Security Analysis
Key Length Requirements
Nested MAC Construction
Block Cipher-based MACs
CBC-MAC
Basic Construction
Security Limitations
Message Length Requirements
CMAC
Subkey Generation
Padding Rules
Security Properties
GMAC
Galois Field Multiplication
Authentication Tag Generation
Universal Hash Function MACs
Wegman-Carter Construction
Polynomial Evaluation
MAC Applications
Network Protocol Security
File Integrity Protection
API Authentication
MAC Limitations
Key Distribution Requirements
Non-repudiation Absence
Authenticated Encryption
Authenticated Encryption Concepts
Confidentiality and Authenticity
Associated Data Protection
Generic Composition Methods
Encrypt-then-MAC
MAC-then-Encrypt
Encrypt-and-MAC
Security Analysis
Dedicated Authenticated Encryption Modes
GCM Mode
Counter Mode Encryption
GHASH Authentication
Performance Characteristics
CCM Mode
CBC-MAC Authentication
Counter Mode Encryption
Nonce Requirements
EAX Mode
OMAC Authentication
Counter Mode Encryption
OCB Mode
Offset Codebook
Parallelizable Operations
Patent Considerations
AEAD Algorithms
ChaCha20-Poly1305
Stream Cipher Integration
Polynomial MAC
AES-GCM
Hardware Acceleration
Implementation Considerations
Digital Signatures
Signature Scheme Components
Key Generation Algorithm
Signing Algorithm
Verification Algorithm
Security Properties
Existential Unforgeability
Chosen Message Attacks
Strong Unforgeability
Hash-and-Sign Paradigm
Message Hashing
Signature Generation
Verification Process
Signature Algorithms
RSA-PSS
Probabilistic Signature Scheme
Salt Generation
Mask Generation Function
DSA Variants
Parameter Generation
Signature Generation
Verification Process
ECDSA Implementation
Curve Parameters
Nonce Generation
Signature Encoding
Advanced Signature Schemes
Multi-signature Schemes
Key Aggregation
Signature Aggregation
Threshold Signatures
Secret Sharing
Distributed Signing
Blind Signatures
Blinding Factor
Unblinding Process
Ring Signatures
Signer Anonymity
Linkability Properties
Signature Applications
Software Distribution
Document Signing
Blockchain Transactions
Code Signing
Previous
5. Cryptographic Hash Functions
Go to top
Next
7. Key Management and Distribution