Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Computer Science
Data Analysis
Computer Networking
Medicine and the Arts: Humanising Healthcare
Exploring Play: The Importance of Play in Everyday Life
Songwriting: Writing the Lyrics
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Overview of RISC-V security topics, including base ISA, privileged architecture, and security task groups. Explores current developments and future directions in RISC-V security.
Explore sidechannel analysis, incision techniques, and high-level system analysis, focusing on real-world applications like Tesla Model X security vulnerabilities.
Explore cutting-edge cryptographic techniques and protocols, including faster bootstrapping in homomorphic encryption and random obvious transfer for embedded devices.
Explore AES encryption and ISA extensions, covering fixed sliced encryption, scalar ISA design, and AES LBB. Learn about tag verification, generation, and SP evaluation.
Explore post-quantum cryptography, focusing on Kyber and masking techniques. Learn about attacks, defenses, and secure implementations in the quantum computing era.
Explore RSA key generation pitfalls, public exponents, and cryptographic padding schemes. Learn about common errors and their implications for security in this comprehensive overview.
Explore effective vehicle-to-vehicle communication strategies, focusing on implicit certificates and third-round candidates for enhanced automotive safety and efficiency.
Explore cryptanalysis techniques for hash functions, PRFs, and PRGs, covering attacks, round functions, and search methods for enhanced security understanding.
Explore NIST's lightweight cryptography standardization, focusing on WAGE, Estate, Spook, and Jambu algorithms, with insights on quantum attacks and mixed-fit permutations.
Explore authenticated encryption, including combiners, fast decryption, and sponge-type security. Learn about plaintext release and engage in Q&A sessions.
Explore SCA countermeasures, security evaluation techniques, and noise reduction in preprocessing. Learn about joint work and the Fennel approach to enhance cryptographic system protection.
Explore lattice-based cryptography, focusing on NewHope algorithm, hardware designs, and optimizations for post-quantum cryptography implementation.
Explore machine learning fundamentals, methodologies, and applications in this comprehensive overview, from theoretical foundations to practical implementations.
Explore PUFs and white-box cryptography, focusing on security goals, performance evaluation, and practical applications in modern cryptographic systems.
Explore side-channel attack theory, evaluation methods, and countermeasures in cryptography, focusing on masking techniques and optimization strategies.
Get personalized course recommendations, track subjects and courses with reminders, and more.