Mobile Telephony SecurityExplores 2G mobile telephony security, covering authentication, encryption, privacy concerns, and vulnerabilities in encryption algorithms.
Cryptography BasicsCovers authentication, authorization, encryption techniques, vulnerabilities, and the impact of quantum computing on cryptography.
Symmetric Encryption: Physical LimitsExplores the physical limits and security aspects of symmetric encryption schemes, including energy consumption, key recovery, and distinguisher security.
Cryptography FundamentalsCovers the basics of cryptography, including key concepts, tools, and protocols used for secure communication and data protection.