Covers side-channel analysis of isogeny-based key encapsulation mechanisms and hash-based digital signatures, focusing on vulnerabilities and security measures in cryptographic systems.
Explores symmetric cryptography for integrity, emphasizing Message Authentication Codes and different encryption approaches to ensure data confidentiality and integrity.