Preview 1
cryptography and one deals with formal approaches to protocol design. Both of these chapters can be read without having met complexity theory or formal methods before. Much of the approach of the book in relation to public key algorithms is reductionist in nature.
Preview 1
Preview 2
Preview 3
Preview 4
Preview 5
Preview 6