Explores RSA encryption, trapdoor functions, hash functions, and cryptographic standards, including a practical example with Apple's iMessage implementation.
Explores message authentication codes and their formalism, with a focus on mobile telephony, covering topics like misuse attacks, security notions, and GSM architecture.
Provides an overview of time-lock encryption and its practical applications, focusing on threshold time-lock encryption algorithms and their security properties.