Coin Rendering: Part 1Covers coin rendering and the limitations of the greedy algorithm in finding optimal solutions.
Attack on RSA using LLLCovers Coppersmith's method for attacking RSA encryption by efficiently finding small roots of polynomials modulo N.
Shor Algorithm: Period FindingCovers the Shor Algorithm for period finding and its application in factorization, discussing the circuit implementation and measurement outcomes.