Explores RSA encryption for privacy and digital signatures, covering keys generation, decoding, possible attacks, hash functions, and cryptographic standards.
Covers side-channel analysis of isogeny-based key encapsulation mechanisms and hash-based digital signatures, focusing on vulnerabilities and security measures in cryptographic systems.