Hash Functions and TablesIntroduces hashing tables, including the Birthday Lemma, Direct-Address Tables, collisions, and Chained-Hash-Search.
Cryptographic Security FundamentalsCovers cryptographic security fundamentals, including collision search algorithms, public-key cryptography, and risks of underestimating collision attacks.
Hash Tables AnalysisCovers the analysis of hash tables, including search operations and expected collisions.
Hashing and SortingCovers hashing, sorting, extendible hashing, linear hashing, and external sorting.
Conditional Access IICovers conditional access, encryption, decryption, authentication, and advanced encryption standards, exploring identity-based encryption, biometrics, and attribute-based encryption.
Total Functions: How and WhyExplores hash table efficiency, total functions in code modeling, and well-founded relations for recursive function termination.
RSA: Trapdoor One-Way FunctionsExplores RSA encryption, trapdoor functions, hash functions, and cryptographic standards, including a practical example with Apple's iMessage implementation.