Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Public Health
Web Development
Data Analysis
Introducción a la genética y la evolución
Introduction to Genetics and Evolution
Machine Learning Foundations: A Case Study Approach
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore blockchain technology's impact on privacy and law enforcement, examining challenges and opportunities in this rapidly evolving field.
Explore advanced cryptographic concepts: Zero Knowledge proofs, Property-Preserving Hashing, and Oblivious RAM (ORAM). Gain insights into cutting-edge techniques for secure data storage and privacy-preserving computations.
Explore symmetric designs, leakage-resilience, and cryptographic concepts like round functions, key schedules, and password hashing in this comprehensive talk on advanced security techniques.
Explore quantum constructions and proofs, delving into advanced concepts and methodologies in quantum computing and cryptography.
Explore isogenies and lattices in cryptography, covering twin smooth integers, polynomials, delayed encryption, sealed bid auctions, and lattice-based techniques for enhanced security.
Comprehensive overview of fully homomorphic encryption's evolution, exploring its journey from concept to practical tool, examining various schemes, and discussing future directions in the field.
Explore implementation challenges in cryptography, focusing on whitebox implementations, masking techniques, and secret sharing strategies. Gain insights into advanced security measures and research developments.
Explore fully homomorphic encryption (FHE) and its applications in input/output operations, focusing on advanced cryptographic techniques and their practical implementations.
Explore public key cryptography and isogenies, covering security notions, prime order groups, key exchange, threshold encryption, and attribute-based encryption.
Explore RISC-V cryptography extensions, their current status, and future developments with insights from Ben Marshall of University of Bristol and PQShield.
Explore co-design and co-verification of masked software implementations on CPUs, focusing on physical side-channel attacks, hardware/software gaps, and innovative solutions.
Explore timing side-channel vulnerabilities in CPUs and potential solutions with expert Ronan Lashermes from INRIA. Gain insights into this critical cybersecurity topic.
Explore post-quantum cryptography advancements and gain insights from CHES 2021 conference closing remarks, advancing your understanding of cutting-edge cryptographic technologies.
Explore various cyber attacks and defense strategies, enhancing your understanding of information security and protective measures in the digital landscape.
Explore symmetric cryptography design, implementation, attacks, and defense strategies in this comprehensive overview of modern encryption techniques and security challenges.
Get personalized course recommendations, track subjects and courses with reminders, and more.