Login to filter by course Login to filter by course Reset
Cryptographic Security ModelsExplores cryptographic security models, decryption vs. key recovery, the ideal cipher, MAC construction, key agreement protocol, public-key cryptosystems, and signature scheme security.
Cryptographic Security ModelsExplores Cryptographic Security Models, including Diffie-Hellman and ElGamal Security, RSA, and practical encryption problems.
Perfect Secrecy: One-time PadExplores perfect secrecy, the one-time pad encryption method, attacks on encryption systems, and the Vigenère cipher.
Privacy-Preserving Crypto IIntroduces Secure Multiparty Computation techniques, covering theoretical frameworks, security models, and practical applications in privacy-preserving cryptography.
Secret Key AgreementExplains secret key agreement systems, perfect secrecy, and the criteria for secure communication.
Homomorphic EncryptionIntroduces homomorphic encryption, enabling computation on encrypted data without decryption, covering security, applications, and practical aspects.
Cryptography FundamentalsDelves into the core principles of cryptography, emphasizing the challenges of key management and the impact of technology advancement on security.
Cryptography and Information TheoryExplores cryptography, perfect secrecy, group theory, and modern cryptographic milestones, emphasizing the trade-off between security and cost.