Related lectures (36)
Cryptographic Security Models
Explores cryptographic security models, decryption vs. key recovery, the ideal cipher, MAC construction, key agreement protocol, public-key cryptosystems, and signature scheme security.
Cryptographic Security Models: Game Proof Methodology
Explores Cryptographic Security Models through the Game Proof Methodology, RSA Security, Rabin Cryptosystem, and Diffie-Hellman Security.
Cryptographic Primitives: Theory and Practice
Explores fundamental cryptographic primitives, security models, and the relationship between decryption security and key recovery security.
Cryptographic Security Models
Explores Cryptographic Security Models, including Diffie-Hellman and ElGamal Security, RSA, and practical encryption problems.
Homomorphic Encryption
Introduces homomorphic encryption, enabling computation on encrypted data without decryption, covering security, applications, and practical aspects.
Ancient Cryptography: Security and Information Theory
Explores ancient cryptography, key security, perfect secrecy, and the Shannon encryption model.
Cryptography Fundamentals
Delves into the core principles of cryptography, emphasizing the challenges of key management and the impact of technology advancement on security.
Information Theoretic Security: Wiretap Channel
Explores secret key generation in the Wiretap Channel model and achievable key rate-leakage pairs.
Perfect Secrecy: One-time Pad
Explores perfect secrecy, the one-time pad encryption method, attacks on encryption systems, and the Vigenère cipher.
Information-Theoretic Cryptography: Partial Secrecy Problem
Explores the Partial Secrecy Problem in Information-Theoretic Cryptography, covering topics like secret communication, computational security, and information leakage.

Graph Chatbot

Chat with Graph Search

Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.

DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.