Explores the physical limits and security aspects of symmetric encryption schemes, including energy consumption, key recovery, and distinguisher security.
Explores the evolution of TLS protocols, the role of certificate authorities, vulnerabilities in outdated encryption, and real-world certificate-related attacks.