Privacy-preserving authenticationExplores privacy-preserving authentication methods, zero-knowledge proofs, Schnorr's proof of identification, and their real-world applications.
Cryptanalysis: Public-KeyExplores cryptanalysis in public-key cryptography, covering attacks, algorithms, and security models.