Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Web Development
Cybersecurity
Computer Networking
Introducción a la gestión de proyectos
Internet History, Technology, and Security
Philosophy, Science and Religion: Religion and Science
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore secure distance measurement techniques for car locks, contact tracing, and navigation. Learn about ultrawide band, physical layer security, and time-of-flight concepts.
Explore advanced multiparty computation techniques, including stacked garbling and improved primitives, in this in-depth presentation and discussion.
Explore cryptanalysis techniques, focusing on discrete logarithm problems in finite fields. Learn about L notation, historical developments, and computational complexity.
Explore pseudorandom quantum states, efficient correlations, and bullet proofs in this advanced cryptography discussion on post-quantum security.
Explore leakage and outsourced encryption, focusing on random probing security and leakage resilient NAT. Gain insights into cutting-edge cryptographic techniques and their applications.
Explore cryptography's foundations, models, and ethical implications with Silvio Micali in this thought-provoking conference talk on the intersection of technology and morality.
Explore the history, evolution, and challenges of IPsec with Steven Bellovin, covering its structure, protocols, and impact on network security.
Explore Bluetooth randomness, RNG variants, and security implications in firmware. Insights on PRNG, cloud data, MITM attacks, and recent patches for cryptographic enthusiasts.
Explore techniques for breaking PDF encryption, including content overlay, form exfiltration, and malleability gadgets. Learn about attacker models, encryption gaps, and potential mitigations.
Explore TPM vulnerabilities, timing attacks, and lattice-based cryptanalysis. Learn about ECDSA nonce issues and their impact on digital signatures in trusted computing.
Explore ECDSA and Schnorr signatures, focusing on randomness vulnerabilities and side-channel attacks. Learn about new attack records and countermeasures in cryptographic implementations.
Explore vulnerabilities in CTR_DRBG cryptographic algorithm, focusing on cache attacks and key rotation flaws. Learn about potential risks in TLS handshakes and SGX execution.
Explore lattice-based cryptography, focusing on memory optimization, security, and asymmetry tweaks. Learn about modular approaches and security reductions in this advanced cryptographic field.
Explore cryptographic primitives including witness maps, efficient reductive signatures, constraint PRFs, and chameleon hash functions. Dive into applications, state-of-the-art techniques, and advanced concepts.
Explore witness indistinguishability and boosting variable computation on encrypted data in this advanced cryptography presentation.
Get personalized course recommendations, track subjects and courses with reminders, and more.