Yifan's Learning Journey
read Real World Cryptography
Introduction
Hash Functions
Message Authentication Codes
Authenticated Encryption
Key Exchanges
Asymmetric Encryption and Hybrid Encrpytion
Signatures and Zero-Knowledge Proofs
Randomness and Secrets
Secure Transport
End-to-End Encryption
User Authentication
Crypto as in Cryptocurrency
Hardware Cryptography
Post-Quantum Cryptography
Is this it? Next-generation Cryptography
When and Where Cryptography Fails