1 Prehistory of Cryptography
p. 8, Solution 1. In question 4, diagrams (a) and (c)
do represent a surjective function.
2 Conventional Cryptography
p. 37, Solution 5. In question 1(a), one should read
and
for the
worst-case and the average case repspectively.
p. 38, Solution 6. In the second question, the
probability that a given
plaintext
is mapped on a given
ciphertext
through the
uniformly distributed random permutation
should be
expanded as follows:
p. 41, Solution 7.
The errata for this exercise is long and only available in the
postscript and pdf errata files (see on the top of this page).
3 Dedicated Conventional Primitives
p. 71, Solution 4. In the third question, one should
read “Clearly, they all produce [...]” instead of “Clearly, the all
produce [...]”.
p. 73, Solution 4. In the eighth question, one
should read “with a probability
e−λ” instead of “with a
probability
eλ”.
4 Conventional Security Analysis
p. 86, Exercise 7. The second of the three boolean
functions is not used in
It is actually part of
which also uses a fourth function.
p. 109, Solution 8. On Figure 4.9, ω
−1 is
wrong: the inputs should be swapped before the xor.
5 Security Protocols with Conventional Cryptography
Nothing yet.
6 Algorithmic Algebra
p. 147, Solution 5. In solution 3, one should read
“the kernel is trivial, i.e., is equal to {1}”.
7 Algorithmic Number Theory
p. 170, Solution 5. The number of prime numbers
smaller than some integer
n is Ω(
n/log
n)
and not Ω(log
n/
n) as written in the solution.
8 Elements of Complexity Theory
Nothing yet.
9 Public Key Cryptography
Nothing yet.
10 Digital Signatures
Nothing yet.
11 Cryptographic Protocols
Nothing yet.
12 From Cryptography to Communication Security
p. 246, Solution 5. In the answer of the second question one
should read
P' =
M' ∥
Q' instead of
P' =
M' ∥
Q.
References
p. 250, Reference [17]. There is a typo in the name of the
first author. The correct name is P. Flajolet.