Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Computer Science
Artificial Intelligence
Ethical Hacking
Lean Production
Introduction to Cyber Security
Bacterial Genomes II: Accessing and Analysing Microbial Genome Data Using Artemis
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore lattice-based cryptography's duality, focusing on public key generation and the GBV crypto system, with insights from expert Daniele Micciancio.
Explore identity-based aggregate and multi-signature schemes using RSA, covering applications, technical aspects, and proofs of knowledge in cryptography.
Explore quantum cryptography's position-based aspects, including impossibility results and potential constructions. Delve into secret communication, verification challenges, and quantum concepts.
Explore constant-rate oblivious transfer techniques derived from noisy channels, advancing cryptographic protocols for secure communication and data exchange.
Explore a novel PMAC variant that surpasses traditional birthday bound limitations, enhancing cryptographic security and efficiency in message authentication.
Explores improved security analysis and alternative solutions for Order-Preserving Encryption, discussing new security notions, proof strategies, and modular approaches to enhance data protection in range queries.
Explore the collision security of Tandem-DM in the ideal cipher model, analyzing query history, evaluation methods, and case studies to understand its cryptographic properties.
Explore innovative cryptographic techniques for secure communication with plausible deniability, enhancing privacy and protection against coercion in public-key encryption systems.
Explore a cryptographic analysis of Skein-256's compression function, examining partial-collision attacks and their implications for the algorithm's security.
Explore time-memory trade-offs in near-collision attacks on hash functions, analyzing complexity and discussing practical applications in cryptography.
Explore known-key security of block ciphers, covering differentiability, nonkey settings, and general indifference. Gain insights into cryptographic concepts and their implications.
Explore cryptanalysis techniques for round-reduced LED cipher, including differential characteristics, complexity analysis, and advanced attack methods.
Explore message authentication techniques resilient to related-key attacks, enhancing cryptographic security in modern communication systems.
Explore complementation in Feistel ciphers, its applications, and implications for cryptography. Learn about generalization, key scheduling, and practical complexities in cipher design.
Explore automated independent-biclique cryptanalysis, a framework for enhancing cryptographic security analysis through efficient algorithmic techniques.
Get personalized course recommendations, track subjects and courses with reminders, and more.