But it's 400 pages and part II and III are not present :|
Also I find the structure kind of odd. I is symmetric, II asymmetric and III protocols. Where do you put lattices, ZKP, lattices, FHE...
Another thing that bugged me: in the Integrity chapter they talk about MAC. Whereas they should talk about hashes, MAC provide integrity + authentication.
This is a common misconception that integrity is enough to protect against a MITM, whereas no you also need authentication. I'm sure this could lead to people just using a hash to secure their data in transit.
But it's 400 pages and part II and III are not present :|
Also I find the structure kind of odd. I is symmetric, II asymmetric and III protocols. Where do you put lattices, ZKP, lattices, FHE...
Another thing that bugged me: in the Integrity chapter they talk about MAC. Whereas they should talk about hashes, MAC provide integrity + authentication.
This is a common misconception that integrity is enough to protect against a MITM, whereas no you also need authentication. I'm sure this could lead to people just using a hash to secure their data in transit.