Cryptographic Security ModelsExplores Cryptographic Security Models, including Diffie-Hellman and ElGamal Security, RSA, and practical encryption problems.
Cryptography and Information TheoryExplores cryptography, perfect secrecy, group theory, and modern cryptographic milestones, emphasizing the trade-off between security and cost.
E-Voting: Research and ChallengesExplores e-voting research, digital algorithms, privacy challenges, and cryptographic methods in ensuring legitimacy and participation.
Applied Cryptography: BasicsIntroduces applied cryptography basics, historical encryption methods, and the concept of perfect secrecy with the One Time Pad.
Public Key Cryptography: RSAExplores public key cryptography, focusing on RSA, key generation, encryption, decryption, security challenges, and vulnerabilities.