Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Computer Science
Data Analysis
Computer Networking
Medicine and the Arts: Humanising Healthcare
Exploring Play: The Importance of Play in Everyday Life
Songwriting: Writing the Lyrics
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore stream ciphers, including construction, complexity, and recent advancements in cryptographic techniques for data protection and security.
Explore advanced techniques in cryptanalysis, focusing on statistical methods to analyze block ciphers and their vulnerabilities, including the sandwich distinguisher approach.
Explore functional encryption, leakage resilient IBA, and encapsulated search indexing. Learn about KDM security, decryption failure, and updatable encryption techniques.
Explore cutting-edge research on physical attacks, information leakage, and countermeasures in cryptography. Gain insights into secure software masking, fault injection, and leakage-resilient designs.
Explore cutting-edge research in multiparty computation, covering topics like homomorphic secret sharing, secure multiplication, garbled function evaluation, and adaptively secure MPC.
Explore advanced cryptographic concepts including onion routing, two-way channels, compliance signatures, and generic group models in this comprehensive technical presentation.
Explore advanced cryptography concepts including derandomization, encryption schemes, differential privacy, and collective coin tossing for secure communication and data protection.
Explore advanced cryptographic concepts like PIR, encrypted RAM, and commitments, with applications to blockchain technology and upgradeable public key encryption.
Explore laser fault injection, two-source non-malleable extractors, and non-interactive commit-and-prove techniques in cryptography and security.
Explore post-quantum cryptography, including multivariate trapdoors, key recovery attacks, and quantum algorithms. Learn about blind signatures and their applications in secure communication.
Explore recent developments in zero-knowledge proofs, including applications, models, constructions, and future challenges in this comprehensive talk by Sarah Meiklejohn at Eurocrypt 2021.
Explore multiparty computation concepts, including abstract circuits, applications, and communication complexity, with insights into motivation scenarios and new research developments.
Explore symmetric cryptanalysis techniques, including automatic search methods and meeting-in-the-middle attacks, with insights on GA1 and GA2 cryptanalysis and their implications.
Explore CHERI architecture and its RISC-V implementation, covering hardware principles, software models, and security implications for modern computing systems.
Explore RISC-V security mechanisms, including privilege modes, page tables, and control flow integrity, with insights on current status and future proposals.
Get personalized course recommendations, track subjects and courses with reminders, and more.