Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Computer Science
Artificial Intelligence
Ethical Hacking
Lean Production
Introduction to Cyber Security
Bacterial Genomes II: Accessing and Analysing Microbial Genome Data Using Artemis
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore efficient public-key encryption based on Computational Diffie-Hellman, presented at PKC 2010. Learn about advancements in cryptographic techniques and their implications for secure communication.
Explore the feasibility of consistent computations in cryptography, covering privacy, two-party security models, and complaint handling, with insights on construction and simulation.
Explore efficient set operations with malicious adversaries, focusing on cryptographic techniques for secure multi-party computation and privacy-preserving data analysis.
Explore techniques to accelerate solving the discrete logarithm problem using equivalence classes, including fast inversion, distinguishing points, and random walks.
Explore secure network coding techniques using integer-based methods, focusing on cryptographic applications and theoretical foundations.
Explore encryption scheme security in weakened random oracle models, examining vulnerabilities and implications for cryptographic systems.
Explore efficient squaring techniques in cyclotomic subgroups of sixth degree extensions, with applications to pairing-based cryptography and advantages of using twists.
Explore advanced cryptographic techniques for fully homomorphic encryption, focusing on optimizing key and ciphertext sizes for improved efficiency and practicality.
Explore algebraic cryptanalysis techniques applied to the PKC'2009 Algebraic Surface Cryptosystem in this concise presentation by Faugère and Spaenlehauer.
Explore faster pairing computations on curves with high-degree twists, focusing on techniques like Miller's Algorithm and sexy twists to enhance cryptographic efficiency.
Explore strategies to safeguard multi-source network coding systems against pollution attacks, enhancing data integrity and network security.
Explore techniques for maximizing small root bounds through linearization, with applications to enhancing security in RSA cryptosystems using small secret exponents.
Explore text search protocols with simulation-based security, covering applications, automata encryption, and evaluation techniques for secure and efficient data retrieval.
Explore cryptographic techniques for achieving chosen-ciphertext security using slightly lossy trapdoor functions, as presented by researchers Petros Mol and Scott Yilek at PKC 2010.
Explore advanced cryptographic concepts: concurrent non-malleable statistically binding commitments and decommitments in constant rounds, presented by experts at PKC 2010.
Get personalized course recommendations, track subjects and courses with reminders, and more.