Description
The basics of computational security, attacker models, and forward secrecy
The strengths and limitations of the TLS protocol behind HTTPS secure websites
Quantum computation and post-quantum cryptography
How algorithms like AES, ECDSA, Ed25519, Salsa20, and SHA-3 work
Advanced techniques like multisignatures, threshold signing, and zero-knowledge proofs






Reviews
There are no reviews yet.