Explores trusted computing, confidentiality, integrity, and side-channel attacks, emphasizing real-world examples and the challenges of ensuring security.
Covers side-channel analysis of isogeny-based key encapsulation mechanisms and hash-based digital signatures, focusing on vulnerabilities and security measures in cryptographic systems.