Explores the practical implementation of security protocols using the biometric passport as a case study, covering vulnerabilities, TLS evolution, and ChaChaPoly encryption.
Explores homomorphic encryption, its applications, challenges, and comparisons with Trusted Execution Environments, as well as the use of aggregated keys for secure data sharing.
Explores the Partial Secrecy Problem in Information-Theoretic Cryptography, covering topics like secret communication, computational security, and information leakage.
Explores the shift to secure communications through the biometric passport case study, covering RFID, identity examples, MRTD, EAC, and cryptographic protocols.
Explores network security through NAT, firewalls, and deep packet inspection, emphasizing the importance of robust host-level defenses and the limitations of protection techniques.