Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Artificial Intelligence
Web Development
Computer Networking
Introductory Human Physiology
Mechanics of Materials I: Fundamentals of Stress & Strain and Axial Loading
Philosophy, Science and Religion: Religion and Science
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore an authenticated encryption scheme with fault detection capabilities, covering its design, implementation, and resistance to fault injection attacks.
Explore cutting-edge cryptographic techniques with SPARKs, a novel paradigm for efficient and parallelizable arguments of knowledge, presented at Eurocrypt 2020.
Explore advanced cryptographic algorithms for discrete logarithms and subset sum problems, focusing on low-weight instances and memory-efficient techniques.
Explore the Algebraic Group Model in cryptography, covering representation, rerandomization, and applications to Schnorr Signatures. Gain insights into recent research and open questions in this field.
Explore fault attacks on hedged Fiat-Shamir signatures, analyzing vulnerabilities and proposing countermeasures for enhanced cryptographic security in digital signature schemes.
Explore advanced cryptographic protocols: two-round oblivious transfer based on CDH or LPN. Learn about simulation-based security, receiver security, and applications in search and indistinguishable OT.
Explore techniques for extracting randomness from unreliable sources, including multi-source extraction, adversarial models, and applications in cryptography. Learn about somewhere-random sources and their potential.
Explore efficient private information retrieval protocols with sublinear online time, focusing on communication complexity, computation complexity, and security proofs in cryptographic systems.
Explore secure multiparty computation, focusing on two-round protocols. Analyze impossibility results, lower bounds, and feasibility in broadcast-optimal settings.
Explore post-quantum cryptography and transparent recursive proofs using holography, focusing on the Fractal system's foundations, implementation, and practical applications in cryptographic security.
Explore key-homomorphic pseudorandom functions based on Learning With Errors, focusing on small modulus applications, security implications, and potential limitations in cryptographic systems.
Explore innovative techniques for private data aggregation, focusing on reducing anonymous messages while maintaining accuracy and privacy in distributed systems.
Explore blind Schnorr signatures and signed ElGamal encryption in the algebraic group model, examining their security properties and applications in cryptographic protocols.
Explore cryptographic protocol security, focusing on active security complexity in secure multiparty computation. Learn about new compilers, communication complexity, and open problems in the field.
Explore multi-instance security and scaling behavior of cryptographic schemes, focusing on key-encapsulation mechanisms and CDH-type problems in public-key encryption.
Get personalized course recommendations, track subjects and courses with reminders, and more.