Description
Uses pseudocode-based reasoning to make provable security accessible to undergraduates
Focuses on proven methods used in practice today
Offers rigorous treatment of symmetric-key and public-key encryption and authentication
Includes advanced material on encrypted messaging, post-quantum cryptography, and zero-knowledge proofs
Features ancillary resources






Reviews
There are no reviews yet.