Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Graphic Design
Data Analysis
Digital Marketing
El rol de la digitalización en la transición energética
First Step Korean
Supporting Successful Learning in Primary School
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore ratcheted encryption and key exchange in secure messaging, covering concepts, generic compilation, and a tricky exchange implementation with motivation and proof.
Explore techniques for modifying block ciphers, focusing on security implications and performance enhancements in cryptographic algorithms.
Explore quantum multi-party computation protocols, focusing on Clifford codes, authentication tests, and magic-state generation for secure computations with dishonest participants.
Explore advanced cryptographic techniques for efficient and secure zero-knowledge proofs, focusing on Marlin's innovative approach to preprocessing zkSNARKs with universal and updatable setups.
Explore automatic generation of secure masked bitsliced implementations for cryptographic algorithms, addressing probing attacks and enhancing performance in hardware security.
Explore the hardness of Learning with Errors (LWE) on general entropic distributions, examining noise-lossiness and its implications for cryptographic security in various scenarios.
Explore advanced cryptographic techniques for disjunctive zero-knowledge proofs, focusing on stacked garbling and its applications in secure computation and privacy-preserving protocols.
Explore statistical ZAP arguments, covering commitment schemes, correlation intractability, and the Fiat-Shamir transform in cryptography. Gain insights into advanced cryptographic concepts and techniques.
Explore birthday bound attacks on cryptographic constructions, focusing on EWCDMD and SoKAC21. Learn about composition techniques, permutations, and distribution attacks in this advanced cryptography talk.
Explore advanced slide attacks on ciphers with self-similarity, including applications to generic SPNs and 1K-AES variants. Learn about slid sets, suggestive plaintext structures, and substitution slide attacks.
Explore cutting-edge advancements in secure two-party computation, focusing on non-interactive protocols and achieving malicious security while maintaining succinctness.
Explore quantum-secure message authentication through blind-unforgeability, examining results, proofs, and implications for cryptographic security in the quantum era.
Explore rational isogenies derived from irrational endomorphisms in cryptography, covering CSIDH, isogeny graphs, and twisting endomorphisms with applications to post-quantum cryptography.
Explore advanced cryptographic techniques for non-interactive zero-knowledge proofs in pairing-free groups, focusing on improved constructions and weaker assumptions.
Explore quantum attacks on CSIDH cryptosystem, focusing on collimation sieve techniques and their implications for proposed parameters' security in post-quantum cryptography.
Get personalized course recommendations, track subjects and courses with reminders, and more.