Cryptographic Security FundamentalsCovers cryptographic security fundamentals, including collision search algorithms, public-key cryptography, and risks of underestimating collision attacks.
Hash Tables AnalysisCovers the analysis of hash tables, including search operations and expected collisions.
Hash Functions and TablesIntroduces hashing tables, including the Birthday Lemma, Direct-Address Tables, collisions, and Chained-Hash-Search.
Distributed Randomness: DrandExplores distributed randomness using Drand, covering cryptographic tools, key exchange, elliptic curve cryptography, and practical applications in blockchain systems.
Hashing and SortingCovers hashing, sorting, extendible hashing, linear hashing, and external sorting.