Jottings

Mathematical reasoning may be regarded rather schematically as the exercise of a combination of two facilities, which we may call intuition and ingenuity. -Alan M. Turing

Cryptography

mindmap

To get started, one can consider the following resources:

Blog posts/interviewsLecture notes/books (free and great quality)Websites/discussion forums
So, You Want to be a Cryptographer - Bruce Schneier (Oct 1999)The Joy of Cryptography - Mike RosulekCryptoHack
Recommended skills for a job in cryptology - Reid (May 2013)A Graduate Course in Applied Cryptography - Dan Boneh and Victor ShoupCryptopals
Applied Cryptography Engineering - Thomas and Erin Ptacek “Matasano” (Jul 2013)Cryptography - David R. KohelCryptography.SE
How Not to Learn Cryptography - Seny Kamara (Nov 2014)A Course in Cryptography - Rafael Pass and Abhi ShelatInformationSecurity.SE
Cryptography and Mathematics - Kristin Lauter’s interview in XRDS: Crossroads, The ACM Magazine for Students (Mar 2015)Foundations of Cryptography - Rafail Ostrovskyr/crypto
How I became a cryptographer and why I left cryptography - Scott Contini (May-Oct 2017)Introduction to Modern Cryptography - Mihir Bellare and Phillip Rogawayr/cryptography
How To Learn Cryptography as a Programmer - Soatok (Jun 2020)Introduction to Cryptography (direct links: videos and course webpage) - Vipul GoyalZero-Knowledge Proofs
How to become a Security Engineer - Cory Hardman (May 2021)Cryptography Primitives and Protocols - Aggelos Kiayias52 Things by Bristol Cryptography
So, you want to be a Cryptographer? - Greg Rubin (May 2022)Proofs, Arguments, and Zero-Knowledge - Justin ThalerSimonsTV
Some Cryptography Books I Like - Lúcás Meier (May 2022)Building Cryptographic Proofs from Hash Functions - Alessandro Chiesa and Eylon YogevCryptology ePrint Archive
The best books for cryptography apprentices - Jean-Philippe Aumasson (Jul 2022)Useful Crypto-related Resources - Sofía CeliAskCrypto

Computationally secure cryptography

These cryptosystems are considered secure against the computation power offered by humans with pencil-paper, computers, and quantum computers.

Unconditionally secure cryptography

Following are some of my jottings: