Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Computer Science
Artificial Intelligence
Ethical Hacking
Lean Production
Introduction to Cyber Security
Bacterial Genomes II: Accessing and Analysing Microbial Genome Data Using Artemis
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore fully homomorphic encryption, focusing on DGHV scheme, public key compression, and modulus switching. Learn about security assumptions and attacks on these cryptographic systems.
Statistical techniques enhance side-channel collision attacks, improving their effectiveness against cryptographic implementations. Higher-order moments and general forms address practical issues in various scenarios.
Explore faster algorithms for approximate common divisors, enhancing security in fully homomorphic encryption schemes and addressing key recovery attacks in various cryptographic contexts.
Explore zero-knowledge arguments for mix-net correctness in e-voting, focusing on efficient techniques and implementations to enhance security and reduce computational costs.
Explore cryptographic security concepts and their implications in this talk from Eurocrypt 2012, featuring insights from leading researchers in the field.
Explore quantum zero-knowledge proofs and proofs of knowledge, including Watrous' quantum rewinding, extractor construction, and achieving strict soundness in quantum protocols.
Explore cutting-edge research on secure multi-party computation protocols, focusing on achieving concurrent security in constant rounds for enhanced efficiency and practicality.
Explore identity-based encryption resilient to auxiliary inputs, featuring novel theorems, constructions, and extensions for enhanced security in cryptographic systems.
Explores advanced concepts in message authentication, including algebraic MACs, security definitions, and novel constructions. Presents transformations and results for improving MAC schemes.
Explore lossy trapdoor functions, their construction, and applications in cryptography with insights from Dennis Hofheinz's Eurocrypt 2012 presentation.
Explore identity-based trapdoor functions, their security notions, and applications in cryptography. Learn about lossy variants and their implications for encryption schemes.
Explore advanced techniques for solving discrete logarithm problems on elliptic curves, including cover maps, decomposition attacks, and modified index calculus methods.
Explore advanced homomorphic encryption concepts, including LWE, BV'11b construction, dimension reduction, and leveled FHE, building on fundamental knowledge from part 1.
Explore homomorphic encryption fundamentals, including computing on encrypted data, Gentry's blueprint, and advanced concepts like bootstrapping and chimeric HE.
Explore advanced cryptography concepts with a focus on functional encryption for inner product, achieving constant-size ciphertexts in prime-order groups.
Get personalized course recommendations, track subjects and courses with reminders, and more.