Commitment Scheme and PRNGExplores the commitment scheme, key derivation function, and pseudorandom generator in cryptographic protocols, emphasizing their role in ensuring data integrity and authentication.
Authentication - TokensCovers the concept of tokens, how they work, and the implementation of two-factor authentication.
Conditional Access IICovers conditional access, encryption, decryption, authentication, and advanced encryption standards, exploring identity-based encryption, biometrics, and attribute-based encryption.
Cryptographic Security FundamentalsCovers cryptographic security fundamentals, including collision search algorithms, public-key cryptography, and risks of underestimating collision attacks.
Mobile Telephony SecurityExplores the security challenges and improvements in mobile telephony, covering encryption algorithms, protocols, and integrity/authentication issues.