Table of contents What's this Chapter 1 - Introduction Exercise 1.1 Chapter 3 - Private-Key Encryption Exercise 3.1 Chapter 4 - Message Authentication Codes Exercise 4.7 Exercise 4.8 Exercise 4.14 Exercise 4.15 Extra: Authenticated Encryption CBC-XOR Chapter 5 - Hash Functions and Applications Exercise 5.3 Chapter 8 - Number Theory and Cryptographic Hardness Assumptions (Unresolved) Exercise 8.15