Cryptographic Hash FunctionsExplores cryptographic hash functions, message authentication codes, and MAC constructions, highlighting SHA1, SHA2, SHA3, HMAC, CBC-MAC, WC-MAC, and P-MAC.
Linkability of e-passportsExplores breaking the unlinkability of e-passports using Bisimilarity and T-calculus, highlighting vulnerabilities and the need for new protocols.
Wood Management in SwitzerlandExplores the management of wood in Switzerland, analyzing its use for construction and energy purposes in different scenarios.
Mobile Telephony SecurityExplores the security challenges and improvements in mobile telephony, covering encryption algorithms, protocols, and integrity/authentication issues.
Message Authentication Codes: FormalismExplores message authentication codes and their formalism, with a focus on mobile telephony, covering topics like misuse attacks, security notions, and GSM architecture.