Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Public Health
Web Development
Data Analysis
Introducción a la genética y la evolución
Introduction to Genetics and Evolution
Machine Learning Foundations: A Case Study Approach
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore efficient verification of computations on large datasets, including high-degree polynomial functions, verifiable keyword search, and proofs of retrievability, based on cryptographic assumptions.
Explores cryptographic protocols for verifying set operations performed by untrusted servers, introducing efficient authenticated data structures for public verification with optimal complexity.
Explore cryptography's evolution and future challenges with Ron Rivest's insightful lecture, covering key developments, research directions, and the field's impact on society and technology.
Explore automated security proof generation for cryptographic systems using EasyCrypt, streamlining the process with SMT solvers and theorem provers for efficient verification.
Explores improvements to the Leftover Hash Lemma, reducing entropy loss and seed length in cryptographic key derivation. Discusses the expand-then-extract approach and its security implications.
Explore advanced cryptography techniques with a focus on Fully Homomorphic Encryption, discussing its implementation and potential for improved efficiency in secure data processing.
Explore cutting-edge techniques for decoding random binary linear codes, presented by experts at Eurocrypt 2012. Learn about innovative approaches that push the boundaries of cryptography.
Explore cryptanalysis techniques for IDEA cipher, focusing on meet-in-the-middle attacks and narrow bicliques. Learn about advanced methods in symmetric cryptography.
Explore fair computation with rational players, focusing on two-party computation, game theory in cryptography, and strategies for achieving fairness in real-world and ideal-world scenarios.
Explore key-alternating ciphers in cryptography, focusing on encryption techniques and provable security settings. Gain insights from experts in the field at Eurocrypt 2012.
Explore a novel approach to detecting dangerous queries in cryptography, focusing on public key encryption, indistinguishability, and CCA security. Learn about DCCA security and its properties.
Explore secure multiparty computation techniques with low communication and computational overhead, focusing on fully homomorphic encryption and threshold-based approaches.
Cryptanalysis techniques for Merkle-Damgård MAC, including secret prefix attacks, internal cohesion, and diamond structures. Explores generic approaches and potential applications in hash function security.
Explore innovative techniques in public-key encryption, focusing on incremental and deterministic approaches presented at Eurocrypt 2012 by leading cryptography researchers.
Explore the security of Schnorr-type signatures in cryptography, focusing on forger adversaries, discrete logarithms, and meta-reductions. Gain insights into advanced cryptographic concepts and techniques.
Get personalized course recommendations, track subjects and courses with reminders, and more.