Explores the basics and applications of elliptic curve cryptography, covering ECM factorization, standard curves, practical examples, and real-world implementations.
Explores homomorphic encryption, its applications, challenges, and comparisons with Trusted Execution Environments, as well as the use of aggregated keys for secure data sharing.