Explores cryptanalysis through decorrelation techniques and proving security in conventional cryptography, covering topics like distinguishing functions, matrices, and the random oracle model.
Explores RSA encryption, trapdoor functions, hash functions, and cryptographic standards, including a practical example with Apple's iMessage implementation.
Explores RSA encryption for privacy and digital signatures, covering keys generation, decoding, possible attacks, hash functions, and cryptographic standards.