Introduction / Background Theory / Private-Key Cryptosystems / Public-Key Cryptosystems / Pseudorandomness / Hashing / Digital Signatures / Authentication / Secret Sharing / Group-Oriented Cryptography / Key Establishment Protocols / Zero-Knowledge Proof Systems / Identification / Intrusion Detection / Electronic Elections and Digital Money / Database Protection and Security / Access Control / Network Security / References / Index
+ Read more