CNS - Lecture Notes Summary


01 - Introduction

02 - Semantic Security

03 - Stream Ciphers (802.11 WEP)

04 - User Authentication (802.11 WEP)

05 - Passwords Security

06 - User Authentication I

07 - User Authentication II

08 - User Authentication III

09 - Wireless Cellular Authentication I

10 - Wireless Cellular Authentication II

11 - Message Authentication I

12 - Message Authentication II

13 - RADIUS I

14 - RADIUS II

15 - DIAMETER

16 - TLS I

17 - TLS II

18 - TLS III

19 - Block Ciphers

20 - TLS IV

21 - TLS Handshake I

22 - Asymmetric Cryptography I

23 - Asymmetric Cryptography II

24 - Asymmetric Cryptography III

25 - Asymmetric Cryptography IV

26 - Asymmetric Cryptography V

27 - TLS Handshake II

28 - TLS V

29 - Bleichenbacher's Oracle

30 - The Failure of PKI

31 - TLS v1.3

32 - IPsec I

33 - IPsec II

34 - Secret Sharing I

35 - Secret Sharing II

36 - Verifiable Secret Sharing

37 - Group Theory

38 - Applications of Secret Sharing I

39 - Applications of Secret Sharing II

40 - Applications of Secret Sharing III

41 - Linear Secret Sharing

42 - Elliptic Curve Crypto I

43 - Elliptic Curve Crypto II

44 - Bilinear Maps

45 - CP-ABE