Privacy-preserving authenticationExplores privacy-preserving authentication methods, zero-knowledge proofs, Schnorr's proof of identification, and their real-world applications.
Cryptographic Security ModelsExplores cryptographic security models, decryption vs. key recovery, the ideal cipher, MAC construction, key agreement protocol, public-key cryptosystems, and signature scheme security.
Conditional Access IICovers conditional access, encryption, decryption, authentication, and advanced encryption standards, exploring identity-based encryption, biometrics, and attribute-based encryption.
Applied Cryptography: BasicsIntroduces applied cryptography basics, historical encryption methods, and the concept of perfect secrecy with the One Time Pad.
Distributed Randomness: DrandExplores distributed randomness using Drand, covering cryptographic tools, key exchange, elliptic curve cryptography, and practical applications in blockchain systems.
E-Voting: Research and ChallengesExplores e-voting research, digital algorithms, privacy challenges, and cryptographic methods in ensuring legitimacy and participation.
Cryptographic Security FundamentalsCovers cryptographic security fundamentals, including collision search algorithms, public-key cryptography, and risks of underestimating collision attacks.