Explores RSA encryption for privacy and digital signatures, covering keys generation, decoding, possible attacks, hash functions, and cryptographic standards.
Explores message authentication codes and their formalism, with a focus on mobile telephony, covering topics like misuse attacks, security notions, and GSM architecture.