Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Artificial Intelligence
Web Development
Computer Networking
Introductory Human Physiology
Mechanics of Materials I: Fundamentals of Stress & Strain and Axial Loading
Philosophy, Science and Religion: Religion and Science
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore cutting-edge research in multiparty computation, covering topics like homomorphic secret sharing, secure multiplication, garbled function evaluation, and adaptively secure MPC.
Explore advanced cryptographic concepts including onion routing, two-way channels, compliance signatures, and generic group models in this comprehensive technical presentation.
Explore advanced cryptography concepts including derandomization, encryption schemes, differential privacy, and collective coin tossing for secure communication and data protection.
Explore advanced cryptographic concepts like PIR, encrypted RAM, and commitments, with applications to blockchain technology and upgradeable public key encryption.
Explore laser fault injection, two-source non-malleable extractors, and non-interactive commit-and-prove techniques in cryptography and security.
Explore post-quantum cryptography, including multivariate trapdoors, key recovery attacks, and quantum algorithms. Learn about blind signatures and their applications in secure communication.
Explore recent developments in zero-knowledge proofs, including applications, models, constructions, and future challenges in this comprehensive talk by Sarah Meiklejohn at Eurocrypt 2021.
Explore multiparty computation concepts, including abstract circuits, applications, and communication complexity, with insights into motivation scenarios and new research developments.
Explore symmetric cryptanalysis techniques, including automatic search methods and meeting-in-the-middle attacks, with insights on GA1 and GA2 cryptanalysis and their implications.
Explore CHERI architecture and its RISC-V implementation, covering hardware principles, software models, and security implications for modern computing systems.
Explore RISC-V security mechanisms, including privilege modes, page tables, and control flow integrity, with insights on current status and future proposals.
Overview of RISC-V security topics, including base ISA, privileged architecture, and security task groups. Explores current developments and future directions in RISC-V security.
Explore sidechannel analysis, incision techniques, and high-level system analysis, focusing on real-world applications like Tesla Model X security vulnerabilities.
Explore cutting-edge cryptographic techniques and protocols, including faster bootstrapping in homomorphic encryption and random obvious transfer for embedded devices.
Explore AES encryption and ISA extensions, covering fixed sliced encryption, scalar ISA design, and AES LBB. Learn about tag verification, generation, and SP evaluation.
Get personalized course recommendations, track subjects and courses with reminders, and more.