Cryptography: Data IntegrityExplains the properties of cryptographic hash functions and Message Authentication Codes for ensuring data integrity.
Conditional Access IICovers conditional access, encryption, decryption, authentication, and advanced encryption standards, exploring identity-based encryption, biometrics, and attribute-based encryption.
Symmetric Encryption: Physical LimitsExplores the physical limits and security aspects of symmetric encryption schemes, including energy consumption, key recovery, and distinguisher security.
Authentication: PasswordsCovers the importance of passwords in authentication, including secure transfer, storage, and checking techniques.
Cryptographic Hash FunctionsExplores cryptographic hash functions, message authentication codes, and MAC constructions, highlighting SHA1, SHA2, SHA3, HMAC, CBC-MAC, WC-MAC, and P-MAC.