Login to filter by course Login to filter by course Reset
Cryptographic Security ModelsExplores cryptographic security models, decryption vs. key recovery, the ideal cipher, MAC construction, key agreement protocol, public-key cryptosystems, and signature scheme security.
Symmetric Encryption: Physical LimitsExplores the physical limits and security aspects of symmetric encryption schemes, including energy consumption, key recovery, and distinguisher security.
Symmetric Encryption SchemesExplores symmetric encryption schemes, including block and stream ciphers, their vulnerabilities, and the importance of key lengths.