Login to filter by course Login to filter by course Reset
Cryptanalysis: Public-KeyExplores cryptanalysis in public-key cryptography, covering attacks, algorithms, and security models.
Secret Key AgreementExplains secret key agreement systems, perfect secrecy, and the criteria for secure communication.
Conditional Access IICovers conditional access, encryption, decryption, authentication, and advanced encryption standards, exploring identity-based encryption, biometrics, and attribute-based encryption.
Cryptographic Security FundamentalsCovers cryptographic security fundamentals, including collision search algorithms, public-key cryptography, and risks of underestimating collision attacks.
RSA: Trapdoor One-Way FunctionsExplores RSA encryption, trapdoor functions, hash functions, and cryptographic standards, including a practical example with Apple's iMessage implementation.