Partitioning Oracle AttacksExplores partitioning oracle attacks, multi-key collision resistance, AES-GCM authentication, and simulation results.
Security Algorithms: DESExplores perfect confidentiality, algorithmic security, one-way functions in DES, and the challenges of NP-complete problems.
Cryptographic Security ModelsExplores cryptographic security models, decryption vs. key recovery, the ideal cipher, MAC construction, key agreement protocol, public-key cryptosystems, and signature scheme security.
Symmetric Encryption: Physical LimitsExplores the physical limits and security aspects of symmetric encryption schemes, including energy consumption, key recovery, and distinguisher security.