Related lectures (67)
Forkas Lemma: Theorem of the Alternatives
Explores the Forkas Lemma and the Theorem of the Alternatives in linear equation systems.
Cryptanalysis: Public-Key
Explores cryptanalysis in public-key cryptography, covering attacks, algorithms, and security models.
SSO Wars: The Token Menace
Covers SAML signature verification, resolving security keys, token handlers vulnerabilities, and a Sharepoint privilege escalation demo.
Trust Establishment: Cryptography and Security
Explores trust establishment in cryptography and security, covering secure channels, PKI vulnerabilities, and diverse cryptographic models.
Farkas' Lemma: Applications in Game Theory
Explores Farkas' Lemma, hyperplane separation, combinatorics, and its application in game theory, focusing on penalty kick strategies.
Asymmetric Cryptography and Password-based Authentication
Covers asymmetric cryptography, hybrid encryption, Diffie-Hellman key exchange, authentication challenges, secure password storage, and transfer methods.
RSA: Trapdoor One-Way Functions
Explores RSA encryption, trapdoor functions, hash functions, and cryptographic standards, including a practical example with Apple's iMessage implementation.
Conditional Access II
Covers conditional access, encryption, decryption, authentication, and advanced encryption standards, exploring identity-based encryption, biometrics, and attribute-based encryption.
Certificates: Existence and Proving
Explores certificates, proving solution existence, constraints, and linear programming duality.
Cryptanalysis: Public-Key & The Power of Interaction
Explores cryptanalysis in public-key systems and the power of interaction in interactive proofs, covering CO-NP, NP classes, P vs. NP, and more.

Graph Chatbot

Chat with Graph Search

Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.

DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.