| |  | | Background and reminders
1. Protocols and algorithms
2. Block ciphers and stream ciphers
3. Some impossible things
4. Impossible things with random numbers, part 1
5. Impossible things with random numbers, part 2
6. Provable security
7. Distributing "secret" software
8. Entropy and compression
|