Related lectures (140)
Anonymity Online: Techniques and Weaknesses
Explores online anonymity techniques and weaknesses, including bypassing geo-blocking and avoiding tracking.
Symmetric Encryption: Physical Limits
Explores the physical limits and security aspects of symmetric encryption schemes, including energy consumption, key recovery, and distinguisher security.
Network Security - Transport Layer Security
Discusses the limitations of TCP, the TLS Handshake, and the vulnerabilities in TLS protocols, emphasizing the importance of provable security in TLS 1.3.
Cryptographic Security Models
Explores cryptographic security models, decryption vs. key recovery, the ideal cipher, MAC construction, key agreement protocol, public-key cryptosystems, and signature scheme security.
Structural Analysis: Trusses and Stiffness Matrix
Covers the analysis of trusses and stiffness matrix derivation in structural engineering.
Cryptographic Security Models: Game Proof Methodology
Explores Cryptographic Security Models through the Game Proof Methodology, RSA Security, Rabin Cryptosystem, and Diffie-Hellman Security.
Designing Learning Experiences: CS411 Class Project
Introduces the CS411 Class Project, where students design and test a lesson using learning theories.
Message Authentication Codes: Formalism
Explores message authentication codes and their formalism, with a focus on mobile telephony, covering topics like misuse attacks, security notions, and GSM architecture.
Moscow e-Voting: Encryption Scheme Breakdown
Explores the vulnerabilities of the Moscow Internet Voting System and the fixes implemented after attacks on the encryption scheme.
Security Protocols in Practice
Explores the practical implementation of security protocols using the biometric passport as a case study, covering vulnerabilities, TLS evolution, and ChaChaPoly encryption.

Graph Chatbot

Chat with Graph Search

Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.

DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.