Public-Key Cryptography: Post-Quantum and Access Control
Related lectures (98)
Graph Chatbot
Chat with Graph Search
Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.
DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.
By the instructor Nicolas Sangouard explores Quantum Key Distribution, its vulnerabilities to quantum computers, and the importance of secure key distribution protocols.
Explores zero-knowledge proofs, their properties, practical applications, and implementation in real-world scenarios, including attribute-based credentials.
Covers fundamental concepts of cryptography, including primitives, security, encryption, and authentication, exploring symmetric and public-key cryptography, key agreement, commitment schemes, and hash functions.
Explores homomorphic encryption, its applications, challenges, and comparisons with Trusted Execution Environments, as well as the use of aggregated keys for secure data sharing.