Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Artificial Intelligence
Software Development
Cybersecurity
Transforming Digital Learning: Learning Design Meets Service Design
Matrix Algebra for Engineers
Anatomy: Know Your Abdomen
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore advanced cryptanalysis techniques for symmetric ciphers, including key recovery attacks, algebraic attacks, and quantum rebound attacks on various cryptographic algorithms and hash functions.
Explore advanced cryptographic techniques like NIZKs and SNARKs, covering topics such as universal zkSNARKs, non-adaptive soundness, inner pairing products, and efficient proofs for algebraic sets.
Explore advanced cryptographic techniques including balanced non-adjacent forms, encrypted data search, homomorphic encryption for finite fields, and improved bootstrapping for TFHE.
Explore advanced topics in symmetric cryptanalysis, including division property transitions, integral distinguishers, superpoly recovery, quantum linearization attacks, and key-guessing improvements.
Explore advanced cryptographic concepts including zero-knowledge proofs, threshold signatures, and multi-signatures through expert presentations on recent research and innovations.
Explore advanced lattice cryptanalysis techniques, including NTRU fatigue, dual lattice attacks, quantum random walks, and key mismatch attacks on lattice-based KEMs.
Explore cutting-edge cryptographic protocols addressing network challenges, privacy, blockchain, and contact tracing. Gain insights into innovative solutions for secure communication and data protection.
Explore advanced symmetric-key cryptography topics, including hash functions, authenticated encryption, format-preserving encryption, and message authentication, presented by leading researchers in the field.
Welcome and best paper presentation at Eurocrypt 2022, featuring remarks from officials and an award-winning talk on practical Garbled RAM implementation called EpiGRAM.
Explore cutting-edge cryptographic theory in this Asiacrypt 2021 presentation, delving into advanced concepts and recent developments in the field.
Explore compressed sigma-protocols for bilinear group arithmetic circuits and their application to logarithmic transparent threshold signatures in this advanced cryptography presentation.
Explore interactive non-malleable codes with Nils Fleischhacker, delving into cryptographic techniques for secure communication and data integrity in interactive settings.
Explore optimal consensus protocols balancing synchronous efficiency with robust asynchronous fallback, enhancing blockchain and distributed systems reliability.
Explore the intricacies and challenges of collision-resistant hash functions in cryptography, examining their complexity and implications for security systems.
Explore cutting-edge cryptography research with presentations on NTRU problem hardness, geometric linear cryptanalysis, and lattice enumeration for Tower NFS in discrete logarithm computation.
Get personalized course recommendations, track subjects and courses with reminders, and more.