Today our livesare very different and there is a demand for quick and easy responses. We exchangesecret keys every day when we are working on our laptops and smartphones. We encrypt and authenticate messages without noticing it.order a nonacademicreader to understand "what's it is all about"
1. Introduction
2. Diffie-Hellman key exchange
3. RSA (Rivest, Shamir, Adleman)
4. AES: Advanced Encryption Standard
5. Hash functions
6. Blockchain and crypto currencies
7. Postquantum cryptology
8. Elliptic Curves
9. Secret Sharing
10. Digital Signatures
11. MAC
12. The rest of the story
If you want to read more