Cryptographic Security ModelsExplores Cryptographic Security Models, including Diffie-Hellman and ElGamal Security, RSA, and practical encryption problems.
Cryptographic Security ModelsExplores cryptographic security models, decryption vs. key recovery, the ideal cipher, MAC construction, key agreement protocol, public-key cryptosystems, and signature scheme security.
Cryptanalysis: Public-KeyExplores cryptanalysis in public-key cryptography, covering attacks, algorithms, and security models.
Conditional Access IICovers conditional access, encryption, decryption, authentication, and advanced encryption standards, exploring identity-based encryption, biometrics, and attribute-based encryption.
Applied Cryptography: BasicsIntroduces applied cryptography basics, historical encryption methods, and the concept of perfect secrecy with the One Time Pad.
RSA: Trapdoor One-Way FunctionsExplores RSA encryption, trapdoor functions, hash functions, and cryptographic standards, including a practical example with Apple's iMessage implementation.
Distributed Randomness: DrandExplores distributed randomness using Drand, covering cryptographic tools, key exchange, elliptic curve cryptography, and practical applications in blockchain systems.
Homomorphic EncryptionExplores homomorphic encryption, enabling computations on encrypted data without decryption, with practical applications in secure medical clouds.