When I wanted to understand how AACS works I found very little information/explanation. The Subset-Difference tree and how it provides efficient revocation in a broadcast encryption scenario was particularly opaque.
This talk aims to demystify the crypto in AACS, explaining how we can revoke a device's ability to decode media without relying on co-operation from the device.
I code 9-5, and sometimes more than that. I believe Security helps you learn by challenging assumptions, and Mathematics is beautiful logic; Cryptography is the glorious child of the two.