Βιβλιογραφία - Υλικό - Σύνδεσμοι
                                        Completion requirements
                                        
                            Βιβλιογραφία
- Σημειώσεις Ε. Ζάχου - Α. Παγουρτζή, ΕΜΠ, 2014.
 - D. Stinson: Cryptography: Theory and Practice, 3rd edition, CRC Press, 2005.
 - A. Menezes, P. van Oorschot, and C. Vanstone: Handbook of Applied Cryptography: http://www.cacr.math.uwaterloo.ca/hac.
 - J. Katz and Y. Lindell: Introduction to Modern Cryptography, Chapman & Hall/CRC Press, 2007.
 - V. Shoup: A Computational Introduction to Number Theory and Algebra:http://shoup.net/ntb/.
 - B. Schneier: Applied Cryptography: http://www.schneier.com/book-applied.html.
 - W.Trappe, L. Washington: Introduction to Cryptography with Coding Theory.
 - A.Κιαγιάς: Τεχνικές Σύγχρονης Κρυπτογραφίας: σημειώσεις
 - W. Stallings: Κρυπτογραφία και ασφάλεια δικτύων
 - C. and J. Pelzl. Understanding cryptography: a textbook for students and practitioners. Springer Science-Business Media, 2009.
 - N. Smart. Introduction to cryptography: σημειώσεις (pdf)
 - Berry Schoenmakers, Cryptographic Protocols: pdf
 - D. Boneh, Introduction to cryptography (Stanford), Coursera Online Course
 - Bitcoin and Cryptocurrency Technologies (Princeton): pdf
 
Κείμενα για συμπληρωματική μελέτη
- Ε. Ζάχος, Α. Παγουρτζής, Δ. Φωτάκης: "Σύντομη Εισαγωγή στη Θεωρία Πολυπλοκότητας":pdf
 - Ε. Ζάχος: "Computational Complexity Notes (in English)":pdf
 - V. Shoup: "A Primer on Algebra and Number Theory for Computer Scientists":pdf
 - R. Rivest, A. Shamir, L. Adleman: "A Method for Obtaining Digital Signatures and Public-Key Cryptosystems": pdf.
 - W. Diffie, M. Hellman: "New Directions in Cryptography": pdf.
 - S. Goldwasser, M. Belare: Lecture Notes on Cryptography: pdf.
 - M. Agrawal, N. Kayal, N. Saxena: PRIMES is in P: pdf.
 - A. Shamir, How to share a secret. Communications of the ACM 22.11 (1979): 612-613.
 - D Boneh, Twenty years of attacks on the RSA cryptosystem. Notices of the AMS 46.2 (1999): 203-213.
 - Satoshi Nakamoto, Bitcoin: A Peer-to-Peer Electronic Cash System: pdf
 
Links
- Γενικά για κρυπτογραφία:
 
- MIT Cryptography and Security links
 - Stanford Introduction to Cryptography course
 - http://www-cse.ucsd.edu/users/mihir/papers/gb.html
 - Mihir Bellare's web page (links to courses, papers, etc.)
 - Cryptology ePrint archive (large collection of research papers)
 - ETH Information Security and Cryptography Research Group
 - Bruce Schneier's blog
 - International Association for Cryptologic Research (IACR)
 - Foundations in Cryptology and Security research centre (Denmark)
 
- Ειδικά θέματα:
 
- DES Modes of Operation
 - Περιγραφή του MD5 (+στοιχεία υλοποίησης)
 - Υλοποίηση του MD5
 - Πρότυπο Κρυπτογράφησης με "Συμβόλαιο" (Escrowed Encryption Standard)(specifications mainly)
 - Πρότυπο Ασφαλούς Αποτυπώματος [Secure Hash Standard (SHS)](specifications mainly)
 - Σύστημα Πιστοποίησης Kerberos
 - Μήκος Κλειδιών για Επαρκή Ασφάλεια στην Κλασσική Κρυπτογραφία
 - Ψηφιακό Χρήμα - Ηλεκτρονικό Εμπόριο
 - What is the Random Oracle Model and why should you care? (M. Green)
 - A riddle wrapped in an enigma (Neal Koblitz and Alfred J. Menezes)
 - Introducing Elliptic Curves (Jeremy Kun)
 - Elliptic Curve Cryptography: a gentle introduction (Andrea Corbellini)
 - Why chosen ciphertext security matters (V. Shoup)
 - This POODLE Bites: Exploiting The SSL 3.0 Fallback
 - BREACH: Reviving the Crime Attack
 - Bitcoin Developer Guide
 
Last modified: Wednesday, 5 October 2016, 2:07 PM