1. Ancient cryptography: Vigenère, Enigma, Vernam cipher, Shannon theory
  2. Diffie-Hellman cryptography: algebra, Diffie-Hellman, ElGamal
  3. RSA cryptography: number theory, RSA, factoring
  4. Elliptic curve cryptography: elliptic curves over a finite field, ECDH, ECIES
  5. Symmetric encryption: block ciphers, stream ciphers, exhaustive search
  6. Integrity and authentication: hashing, MAC, birthday paradox
  7. Applications to symmetric cryptography: mobile telephony, Bluetooth, WiFi
  8. Public-key cryptography: cryptosystem, digital signature
  9. Trust establishment: secure communication, trust setups
  10. Case studies: Bluetooth, TLS, SSH, PGP, biometric passport