The Joy of Cryptography
 Book
 Dec 1, 2009
 #Cryptography
Book
Number of Pages: 283
Recommended by
This is a really well presented book, and probably has some of the clearest explanations of gamebased security in this entire list. I think a lot of that clarity is owed to the use of state separable proofs, which would honestly make many areas of Cryptography a lot clearer if people used them more. I’d recommend this book even to more accomplished Cryptographers, just as a good introduction to the proof technique.
In terms of the content, this book goes over a lot of topics in symmetric Cryptography, along with a handful of topics in public key Cryptography, with the focus being on proving the security of schemes.
This focus on proofs makes the content on symmetric Cryptography markedly different from the other books I’ve mentioned so far. The focus is more so on proving that you can build large secure constructions, like authenticated encryption, from small assumptions, like pseudorandom functions.
One downside of this book is that there’s not a lot of material on public key Cryptography. I wish there were more material here, because there would be tons of interesting things to cover, even if only focusing on the provable security aspect of composing constructions.
I’d highly recommend this book to anyone who hasn’t read it, especially people who know about Cryptography, but haven’t heard much about state separable proofs yet.

You might also be interested in

 Article
 By Gigi
 Nov 30, 2022

 Article
 By Gigi
 Sep 10, 2022

 Article
 By Anita Ramaswamy
 Dec 28, 2021

 Article
 By Vitalik Buterin
 Nov 5, 2021
The Joy of Cryptography is a textbook for an undergraduate course in cryptography.
The pedagogical approach is anchored in formal definitions/proof of security, but in a way that I believe is more accessible than what is "traditional" in crypto. All security definitions are written in a unified and simplified "gamebased" style. For an example of what security definitions look like in this style, see the index of security definitions (which will make more sense after reading chapters 2 & 4). For example proofs of security in this style, see the supplementary material below.
It is published under a Creative Commons license and is available for free on the author's website.
(From Goodreads)