Privacy-Preserving Crypto IIntroduces Secure Multiparty Computation techniques, covering theoretical frameworks, security models, and practical applications in privacy-preserving cryptography.
Public Key CryptographyExplores public key cryptography, enabling secure communication and key exchange between Alice and Bob.
Authentication - TokensCovers the concept of tokens, how they work, and the implementation of two-factor authentication.
Raccoon Attack on TLS 1.2Explores the Raccoon Attack, a timing attack on TLS-DH(E) that exploits most significant bit oracles.
Modern Cryptography MilestonesExplores the evolution of modern cryptography milestones and the limitations of information theory in practical applications.