Introduction
Review of concepts: probability and entropy
Introduction To Probability, Bertsekas and Tsitsiklis
Information Theory, Inference, and Learning Algorithms, David J.C. MacKay
Write-up on information entropy, Mario Cagalj
Basic security concepts
Cryptography and Network Security: Principles and Practice, William Stallings
Introduction to Modern Cryptography, Jonathan Katz and Yehuda Lindell
Real-World Cryptography, David Wong
Practical Cryptography for Developers, Svetlin Nakov
Security Engineering, Ross Anderson
Overview of Information Security, Mario Cagalj
Symmetric key cryptography
Perfect Secrecy and Ideal Cipher, Mario Cagalj
Symmetric Key Encryption, Mario Cagalj
Asymmetric key cryptography
New Directions in Cryptography, Diffie and Hellman
A Method for Obtaining Digital Signatures and Public-Key Cryptosystems, Rivest, Shamir, and Adleman
Public Key Encryption, Mario Cagalj
Authentication functions
Collision Search Attacks on SHA1, Wang, Yin and Yu
Colliding X.509 Certificates, Lenstra, Wang and Weger
A Method for Obtaining Digital Signatures and Public-Key Cryptosystems, Rivest, Shamir, and Adleman
Message Authentication and Integrity, Mario Cagalj
Password Hashing, Mario Cagalj