Module NameDownload


Sl.No Chapter Name MP4 Download
1IntroductionDownload
2Symmetric-key EncryptionDownload
3Historical Ciphers and their CryptanalysisDownload
4Perfect SecurityDownload
5Limitations of Perfect SecurityDownload
6Introduction to Computational SecurityDownload
7Semantic SecurityDownload
8Pseudo-random Generators (PRGs)Download
9Operations on Pseudorandom GeneratorsDownload
10Stream CiphersDownload
11Provably-secure Instantiation of PRGDownload
12Practical Instantiations of PRGDownload
13CPA-securityDownload
14Pseudo-random Functions (PRFs)Download
15CPA-secure Encryption from PRFDownload
16Modes of Operations of Block Ciphers Part IDownload
17Modes of Operations of Block Ciphers Part IIDownload
18Theoretical Constructions of Block CiphersDownload
19Practical Constructions of Block Ciphers: Part IDownload
20Practical Constructions of Block Ciphers: Part IIDownload
21From Passive to Active AdversaryDownload
22Message Integrity and AuthenticationDownload
23Message Authentication for Long Messages : Part IDownload
24Message Authentication for Long Messages : Part IIDownload

Sl.No Chapter Name English
1IntroductionPDF unavailable
2Symmetric-key EncryptionPDF unavailable
3Historical Ciphers and their CryptanalysisPDF unavailable
4Perfect SecurityPDF unavailable
5Limitations of Perfect SecurityPDF unavailable
6Introduction to Computational SecurityPDF unavailable
7Semantic SecurityPDF unavailable
8Pseudo-random Generators (PRGs)PDF unavailable
9Operations on Pseudorandom GeneratorsPDF unavailable
10Stream CiphersPDF unavailable
11Provably-secure Instantiation of PRGPDF unavailable
12Practical Instantiations of PRGPDF unavailable
13CPA-securityPDF unavailable
14Pseudo-random Functions (PRFs)PDF unavailable
15CPA-secure Encryption from PRFPDF unavailable
16Modes of Operations of Block Ciphers Part IPDF unavailable
17Modes of Operations of Block Ciphers Part IIPDF unavailable
18Theoretical Constructions of Block CiphersPDF unavailable
19Practical Constructions of Block Ciphers: Part IPDF unavailable
20Practical Constructions of Block Ciphers: Part IIPDF unavailable
21From Passive to Active AdversaryPDF unavailable
22Message Integrity and AuthenticationPDF unavailable
23Message Authentication for Long Messages : Part IPDF unavailable
24Message Authentication for Long Messages : Part IIPDF unavailable


Sl.No Language Book link
1EnglishNot Available
2BengaliNot Available
3GujaratiNot Available
4HindiNot Available
5KannadaNot Available
6MalayalamNot Available
7MarathiNot Available
8TamilNot Available
9TeluguNot Available