Introduces Attribute-Based Credentials and Mercurial Signatures, discussing privacy concerns with authentication and the importance of preserving user privacy.
Explores the physical limits and security aspects of symmetric encryption schemes, including energy consumption, key recovery, and distinguisher security.
Explores BGP security weaknesses, real-world incidents, and defenses against BGP hijacking, emphasizing the importance of cryptography in securing routing information.
Covers fundamental concepts of cryptography, including primitives, security, encryption, and authentication, exploring symmetric and public-key cryptography, key agreement, commitment schemes, and hash functions.