Login to filter by course Login to filter by course Reset
Semantic Security: Stream CiphersExplores semantic security in stream ciphers, emphasizing pseudorandom number generators and computational limitations in cryptography.
Cryptographic Security ModelsExplores Cryptographic Security Models, including Diffie-Hellman and ElGamal Security, RSA, and practical encryption problems.
Secret Key AgreementExplains secret key agreement systems, perfect secrecy, and the criteria for secure communication.
Cryptography FundamentalsDelves into the core principles of cryptography, emphasizing the challenges of key management and the impact of technology advancement on security.
Perfect Secrecy: One-time PadExplores perfect secrecy, the one-time pad encryption method, attacks on encryption systems, and the Vigenère cipher.
Homomorphic EncryptionCovers the historical development and key concepts of homomorphic encryption, focusing on the Paillier cryptosystem and the BGV cryptosystem.
Cryptography and Information TheoryExplores cryptography, perfect secrecy, group theory, and modern cryptographic milestones, emphasizing the trade-off between security and cost.