Basics of finite fields.
Private and Public-key cryptography, existing cryptosystems and their security.
Cryptanalysis of existing systems.
Zero-knowledge protocols, One-way functions.
Advanced protocols for different applications, e.g. e-cheque, e-cash etc.
Network and System level security issues.
Bruce Schneier.Applied Cryptography: Protocols, Algorithms, and Source Code in C.
A. J. Menezes, P. C. van Oorshot and S. A. Vanstone.Handbook of Applied Cryptography.