Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Computer Science
Psychology
Microsoft Excel
Lean Production
Viruses & How to Beat Them: Cells, Immunity, Vaccines
Learn Like a Pro: Science-Based Tools to Become Better at Anything
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore covert channels in random number generators, their mechanisms, capacity estimation, and mitigation strategies for enhanced computer security.
Control-flow attestation for embedded systems: detect runtime attacks, ensure software integrity. Novel approach combines remote attestation with control-flow monitoring for enhanced security in IoT devices.
Explore functional lattice cryptography, focusing on cyclotomic rings and FHE implementations. Learn about performance improvements and a compiler for homomorphic evaluation.
Explores efficient batched oblivious PRF for private set intersection, presenting novel protocols and discussing security implications and comparisons with existing methods.
Explore advanced techniques for secure multiparty computation, focusing on oblivious transfer and authentication methods to enhance efficiency and security in distributed computing.
Explore a novel framework for prototyping applications using multilinear maps and matrix branching programs, focusing on optimizations, cryptographic techniques, and performance improvements in program obfuscation.
Explore innovative garbling techniques for Boolean and arithmetic circuits, enhancing cryptographic protocols and secure computation methods.
Optimizing secure multiparty computation for internet use, focusing on efficiency improvements in BMR protocol and OT-based methods for honest-minority settings.
Explore alternative implementations of secure real numbers, including golden section numbers and logarithmic floats, with benchmarks for various operations in secure computation outsourcing.
Innovative approach to protect sensitive data during sleep-wake cycles, addressing memory secrets and implementation challenges in computer security systems.
Innovative mobile device security system using acoustic sensing to automatically lock devices when users leave, preventing data theft and unauthorized access.
Explore Chrome's process-based sandboxing, its security implications, and potential vulnerabilities in web browser architecture. Learn about attacks exploiting the fuzzy web/local boundary.
Explore secure development through a competitive contest format, analyzing builder strategies, common vulnerabilities, and resilience in software security.
Explore techniques for detecting entropy loss in pseudo-random number generators, crucial for cryptographic security. Learn analysis procedures and implementation strategies.
Explores WiFi signal-based mobile password inference, discussing attack scenarios, challenges, system design, and data processing methods for enhancing cybersecurity awareness.
Get personalized course recommendations, track subjects and courses with reminders, and more.