Distributed Randomness: DrandExplores distributed randomness using Drand, covering cryptographic tools, key exchange, elliptic curve cryptography, and practical applications in blockchain systems.
Conditional Access IICovers conditional access, encryption, decryption, authentication, and advanced encryption standards, exploring identity-based encryption, biometrics, and attribute-based encryption.
Applied Cryptography: BasicsIntroduces applied cryptography basics, historical encryption methods, and the concept of perfect secrecy with the One Time Pad.
Quantum Random Number GenerationExplores quantum random number generation, discussing the challenges and implementations of generating good randomness using quantum devices.
Raccoon Attack on TLS 1.2Explores the Raccoon Attack, a timing attack on TLS-DH(E) that exploits most significant bit oracles.
RSA: Trapdoor One-Way FunctionsExplores RSA encryption, trapdoor functions, hash functions, and cryptographic standards, including a practical example with Apple's iMessage implementation.
Cryptography FundamentalsCovers the basics of cryptography, including key concepts, tools, and protocols used for secure communication and data protection.