Login to filter by course Login to filter by course Reset
Semantic Security: Stream CiphersExplores semantic security in stream ciphers, emphasizing pseudorandom number generators and computational limitations in cryptography.
Cryptographic Security ModelsExplores Cryptographic Security Models, including Diffie-Hellman and ElGamal Security, RSA, and practical encryption problems.
Homomorphic EncryptionIntroduces homomorphic encryption, enabling computation on encrypted data without decryption, covering security, applications, and practical aspects.
Perfect Secrecy: One-time PadExplores perfect secrecy, the one-time pad encryption method, attacks on encryption systems, and the Vigenère cipher.
Signal: Security AnalysisExplores the formal security analysis of the Signal Messaging Protocol, covering key concepts and highlighting limitations and results.
Homomorphic EncryptionCovers the historical development and key concepts of homomorphic encryption, focusing on the Paillier cryptosystem and the BGV cryptosystem.
Privacy-preserving authenticationExplores privacy-preserving authentication methods, zero-knowledge proofs, Schnorr's proof of identification, and their real-world applications.
Privacy-Preserving Machine LearningExplores privacy-preserving techniques like secret sharing and homomorphic encryption for secure computations and data protection in machine learning.
Privacy: PETsExplores Privacy-Enhancing Technologies including Tor, secure computation, and homomorphic encryption.