Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Artificial Intelligence
Web Development
Computer Networking
Introductory Human Physiology
Mechanics of Materials I: Fundamentals of Stress & Strain and Axial Loading
Philosophy, Science and Religion: Religion and Science
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore functional encryption and identity-based encryption concepts, including attribute-based encryption, adaptive security, and verifiability in cryptographic systems.
Explore witness maps in cryptography, covering compact, unique, and dual-mode variants. Learn applications like deterministic signatures and puncturable digital signatures.
Explore a novel three-round UC OT extension protocol, offering improved efficiency and security for secure two-party computation in cryptographic applications.
Explore witness indistinguishability in single-round arguments and its applications to access control, presented by Brakerski and Kalai at PKC 2020.
Explore verifiable inner product encryption, addressing conflicting requirements and constructing LPD encryption algorithms for enhanced security and verification in cryptographic applications.
Explores security of RSA-OAEP encryption without random oracles, introducing new notions like extractable functions and XOR-IND to achieve IND-CCA2 security under standard assumptions.
Exploration of QA-NIZK in the BPK model, discussing soundness, subversion security, and new results for Kiltz-Wee QA-NIZK, with implications for persistent zero-knowledge.
Explore key-dependent message security and master-key KDM-secure identity-based encryption in this presentation on advanced cryptographic techniques using pairings.
Explore threshold ring signatures, including new definitions and post-quantum security. Learn about passive adversaries, hardness assumptions, and proof techniques in the post-quantum setting.
Improved analysis of discrete Gaussian distributions for lattice-based cryptography, focusing on smoothness properties and subgaussian random variables to enhance security and efficiency.
Explore efficient zero-knowledge arguments for arithmetic circuits, their applications, and novel approaches to MPC-in-the-head protocols, with a focus on improving performance and reducing communication costs.
Explore a new paradigm for public-key functional encryption, focusing on degree-2 polynomials. Learn about filtering encrypted emails and advancements in cryptographic techniques.
Explore verifiable computation on encrypted data, covering homomorphic encryption, SNARKs, and polynomial commitments for secure and private delegation of computation.
Explores authenticated key exchange in quantum settings, addressing limitations of prior work and proposing a new security model for 2-move protocols in the Quantum Random Oracle Model.
Explore fine-grained cryptography's frontier with Alon Rosen. Delve into public key encryption, polynomial proofs of work, and MA proof systems, uncovering new possibilities in cryptographic complexity.
Get personalized course recommendations, track subjects and courses with reminders, and more.