   
 
   
    
  
 
  CPA
                                
                                    
                                  
 
  
                                
 
 
 
  
  
  
 

     Introduction to Modern Cryptography     

  Foundations of Cryptography - Volume 1 & 2      
     http://www.wisdom.weizmann.ac.il/~oded/foc.html
     Lecture Notes on Cryptography 
http://cseweb.ucsd.edu/~mihir/papers/gb.html
  Le Chiement Asymétrique et la Sécurité Prouvée     

http://www.di.ens.fr/users/pointche/Documents/Reports/2002_HDRThesis.pdf
  
1 / 19 100%