è Symmetric-key Cryptography
Generic Attacks on different types of Feistel schemes.
è Hash Functions
“CRUNCH” Hash functions submitted to SHA-3 NIST Contest.
Authentication schemes based on Multivariate Polynomials, and on Rubik’s cubes.
è Historical cryptography
Deciphering of the encrypted letters of Marie-Antoinette and Marie de Guise.
è Earlier topics
Descriptive Set Theory, Harmonic Analysis, Functional Analysis.