Related lectures (9)
Security Protocols in Practice
Explores the practical implementation of security protocols using the biometric passport as a case study, covering vulnerabilities, TLS evolution, and ChaChaPoly encryption.
Quantum Random Number Generation
Explores quantum random number generation, discussing the challenges and implementations of generating good randomness using quantum devices.
Secure Communications: TLS and Security Protocols
Explores TLS, security protocols, synchronization, fair termination, and secure communication applications.
Secure Communications: Biometric Passport Case Study
Explores the shift to secure communications through the biometric passport case study, covering RFID, identity examples, MRTD, EAC, and cryptographic protocols.
Introduction to Cryptography: Basic Concepts
Covers the basic concepts of cryptography, including Caesar's and Vigenère's ciphers, privacy, authenticity, and message integrity.
Network Security - Transport Layer Security
Discusses the limitations of TCP, the TLS Handshake, and the vulnerabilities in TLS protocols, emphasizing the importance of provable security in TLS 1.3.
Trust Establishment: Cryptography and Security
Explores trust establishment in cryptography and security, covering secure channels, PKI vulnerabilities, and diverse cryptographic models.

Graph Chatbot

Chat with Graph Search

Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.

DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.