Cryptography and Information TheoryExplores cryptography, perfect secrecy, group theory, and modern cryptographic milestones, emphasizing the trade-off between security and cost.
Homomorphic EncryptionExplores homomorphic encryption, enabling computations on encrypted data without decryption, with practical applications in secure medical clouds.
Conditional Access IICovers conditional access, encryption, decryption, authentication, and advanced encryption standards, exploring identity-based encryption, biometrics, and attribute-based encryption.
Cryptographic Security FundamentalsCovers cryptographic security fundamentals, including collision search algorithms, public-key cryptography, and risks of underestimating collision attacks.
Public Key Cryptography: RSAExplores public key cryptography, focusing on RSA, key generation, encryption, decryption, security challenges, and vulnerabilities.
RSA: Trapdoor One-Way FunctionsExplores RSA encryption, trapdoor functions, hash functions, and cryptographic standards, including a practical example with Apple's iMessage implementation.
Cryptography BasicsIntroduces cryptography basics, covering encryption, data integrity, error detection, digital signatures, and authentication.