Cryptographic Security ModelsExplores cryptographic security models, decryption vs. key recovery, the ideal cipher, MAC construction, key agreement protocol, public-key cryptosystems, and signature scheme security.
Applied Cryptography: BasicsIntroduces applied cryptography basics, historical encryption methods, and the concept of perfect secrecy with the One Time Pad.
Generator of a GroupExplores checking a generator of a group, the Diffie-Hellman key exchange, and cryptographic algorithms.
E-Voting: Research and ChallengesExplores e-voting research, digital algorithms, privacy challenges, and cryptographic methods in ensuring legitimacy and participation.
Mobile Telephony SecurityExplores the security challenges and improvements in mobile telephony, covering encryption algorithms, protocols, and integrity/authentication issues.