Explores homomorphic encryption, its applications, challenges, and comparisons with Trusted Execution Environments, as well as the use of aggregated keys for secure data sharing.
Explores zero-knowledge proofs, their properties, practical applications, and implementation in real-world scenarios, including attribute-based credentials.
Explores asymmetric cryptography basics, including encryption, signatures, and Diffie-Hellman, along with advanced topics like RSA and quantum computing implications.