Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Artificial Intelligence
Web Development
Computer Networking
Introductory Human Physiology
Mechanics of Materials I: Fundamentals of Stress & Strain and Axial Loading
Philosophy, Science and Religion: Religion and Science
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore post-quantum cryptography, focusing on Kyber and masking techniques. Learn about attacks, defenses, and secure implementations in the quantum computing era.
Explore RSA key generation pitfalls, public exponents, and cryptographic padding schemes. Learn about common errors and their implications for security in this comprehensive overview.
Explore effective vehicle-to-vehicle communication strategies, focusing on implicit certificates and third-round candidates for enhanced automotive safety and efficiency.
Explore Pilsung's cryptographic vulnerabilities, focusing on round sub-processes, permutations, and randomness. Learn about distinguishers and weak key detection in this cryptanalysis discussion.
Explore low-complexity cryptography, focusing on MPC-friendly primitives and efficient entropy accumulation. Learn about potential attacks and engage in Q&A.
Explore advanced encryption techniques, including broadcast encryption, attribute-based encryption, and multi-input functional encryption, with a focus on security, limitations, and open problems.
Explore zero-knowledge protocols, their construction, main results, and applications in cryptography. Gain insights into this fundamental concept and its implications.
Explore secret sharing techniques, their applications, and a general framework for secure information distribution in cryptography.
Explore applied cryptography and side channels, covering efficient searchable symmetric encryption, random probing security, and secure wire shuffling techniques.
Explore succinct arguments in cryptography, covering proof-carrying data, subquadratic SNARKs, and applications. Learn about universal SNARKs, signature schemes, and performance comparisons.
Explore lattice cryptanalysis techniques, barriers, and implementations with expert insights from leading researchers in the field.
Explore multi-party computation fundamentals, adaptive security, and practical applications in this comprehensive overview of secure collaborative data analysis techniques.
Explore multiparty quantum computations, one-way functions, and obfuscation in this advanced continuation of quantum cryptography concepts.
Explore the Raccoon Attack on TLS-DH(E), its impact on cryptographic protocols, and potential countermeasures. Learn about side-channel vulnerabilities in key derivation processes.
Explore partitioning oracle attacks in cryptography, focusing on authenticated encryption, key multi-collisions, and vulnerabilities in protocols like Shadowsocks and OPAQUE.
Get personalized course recommendations, track subjects and courses with reminders, and more.