* One Time Pad (OTP)
* symmetric ciphers
* asymmetric cryptography (minus signatures)
* homomorphic encryption (at least, the overall principle)
* side-channels attack
Giving more practical examples could have helped though (e.g. HTTPS, GPG, etc)
* One Time Pad (OTP)
* symmetric ciphers
* asymmetric cryptography (minus signatures)
* homomorphic encryption (at least, the overall principle)
* side-channels attack
Giving more practical examples could have helped though (e.g. HTTPS, GPG, etc)