Conditional Access IICovers conditional access, encryption, decryption, authentication, and advanced encryption standards, exploring identity-based encryption, biometrics, and attribute-based encryption.
Modern Cryptography MilestonesExplores the evolution of modern cryptography milestones and the limitations of information theory in practical applications.
Homomorphic EncryptionExplores homomorphic encryption, enabling computations on encrypted data without decryption, with practical applications in secure medical clouds.
Cryptography: General FrameworkExplores the principles of cryptography, encryption, and information security, emphasizing confidentiality, integrity, and responsibility.
Perfect Secrecy: One-time PadExplores perfect secrecy, the one-time pad encryption method, attacks on encryption systems, and the Vigenère cipher.