Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

This is awesome!

But it's 400 pages and part II and III are not present :|

Also I find the structure kind of odd. I is symmetric, II asymmetric and III protocols. Where do you put lattices, ZKP, lattices, FHE...

Another thing that bugged me: in the Integrity chapter they talk about MAC. Whereas they should talk about hashes, MAC provide integrity + authentication.

This is a common misconception that integrity is enough to protect against a MITM, whereas no you also need authentication. I'm sure this could lead to people just using a hash to secure their data in transit.



From the Preface:

  The current draft only contains part I. Parts II and III are forthcoming.


I know. I'm just pointing at the fact that this is already a lot of pages just for a third of the book.


The only lattice methods that come to mind are asymmetric (subset sum and NTRU). What symmetric latticr methods are there?


I was also thinking of lattice in Cryptanalysis but I guess this is a book about Cryptography not Crypta




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: