Are you an EPFL student looking for a semester project?
Work with us on data science and visualisation projects, and deploy your project as an app on top of Graph Search.
This lecture covers cryptographic security models, including security definitions, security against decryption, decryption security vs. key recovery security, the ideal cipher concept, security against distinguishers, distinguishing between real and ideal ciphers, MAC construction, key agreement protocol components, security considerations, public-key cryptosystems, threat models, hard core bits, security against distinguishers, and various security notions in signature schemes.