Discrete Exponentiation ComplexityExplores discrete exponentiation complexity, cyclic groups, and practical cryptography, including popular algorithms like Diffie-Hellman and RSA.
Public Key Cryptography: RSAExplores public key cryptography, focusing on RSA, key generation, encryption, decryption, security challenges, and vulnerabilities.
Conditional Access IICovers conditional access, encryption, decryption, authentication, and advanced encryption standards, exploring identity-based encryption, biometrics, and attribute-based encryption.