Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Artificial Intelligence
Cybersecurity
Computer Networking
How Things Work: An Introduction to Physics
End of Life Care: Challenges and Innovation
Understanding Medical Research: Your Facebook Friend is Wrong
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore fault attacks on lattice-based key encapsulation mechanisms, focusing on Kyber and Saber. Learn about implementation security, attack strategies, and potential countermeasures.
Explore small-subgroup attacks on distributed systems, focusing on MPC implementation vulnerabilities and real-world implications for cryptographic protocols and distributed key generation.
Explore password recovery attacks on SRP implementations, focusing on FLUSH+RELOAD techniques, modular exponentiation vulnerabilities, and mitigation strategies for cryptographic systems.
Explore cryptographic protocols, secure computation, and their applications in communication. Delve into PRFs, gap assumptions, and two-party computation concepts.
Explore cryptographic primitives including universal proxy encryption, linear secret sharing, and secure deterministic encryption in this comprehensive presentation.
Explore efficient group signatures, their construction, and applications in user-controlled and sequential linkability. Learn about key developments and contributions in this cryptographic field.
Explore threshold wallets, Cardano's consensus layer, and randomness beacons in cryptocurrency. Learn about vulnerabilities, exploits, and the interplay between theory and implementation.
Explore Cardano's consensus layer, from theoretical foundations to practical implementation, covering distributed computation, transaction ledgers, network protocols, and formal verification techniques.
Explore computer-aided cryptography, symbolic verification, and verifiable primitives in this comprehensive analysis of formal methods in cryptographic design and security.
Explore zero knowledge proofs, their applications, and advanced concepts like crowd verifiable protocols and non-interactive composition in cryptography.
Learn about updatable encryption, its applications, and latest developments in this concise presentation. Explore syntax, engage in discussions, and gain insights into this crucial cryptographic technique.
Explore authenticated key exchange protocols, their motivations, and recent contributions in cryptography. Gain insights into secure communication methods.
Explore isogeny-based cryptography, its contributions to post-quantum security, and key concepts like radical isogenies and efficient signatures in this comprehensive overview.
Explore quantum algorithms for lattice-based cryptography, focusing on speedups, security models, and practical implications for cryptographic systems.
Explore lattice-based cryptography, covering key concepts, recent developments, and applications in secure communication and data protection.
Get personalized course recommendations, track subjects and courses with reminders, and more.