Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Psychology
Information Technology
Digital Marketing
AP® Microeconomics
Let's Get Started: Building Self-Awareness
Dino 101: Dinosaur Paleobiology
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore AES encryption and ISA extensions, covering fixed sliced encryption, scalar ISA design, and AES LBB. Learn about tag verification, generation, and SP evaluation.
Explore advanced information-theoretic cryptography concepts in this specialized TCC 2024 conference presentation on cutting-edge security research.
Explore advanced cryptographic concepts including ring signatures, witness encryption, and partial blind signatures in this comprehensive theoretical session.
Explore advanced encryption concepts including identity-based matchmaking, authority privacy, and authenticity. Delve into security proofs, key privacy notions, and their applications in modern cryptography.
Explore lattice algorithms and cryptanalysis, covering topics like psychotomic fields, quantum decomposition, and optimization frameworks in this comprehensive talk from Asiacrypt 2022.
Explore symmetric cryptography concepts like public permutations, parallel digests, and functional key wrapping. Gain insights into security proofs, statistical distance, and real-world applications in TLS.
Explore practical cryptography concepts including encryption, ciphers, and boomerang attacks in this comprehensive tutorial on advanced cryptographic techniques.
Explore key exchange, modular proofs, and linear homomorphic encryption in this comprehensive cryptography talk, covering security models and real-world protocol applications.
Explore advanced encryption techniques including attribute-based and fully homomorphic encryption, covering key concepts, policies, and practical applications in cryptography.
Explore zero-knowledge proofs, forward secrecy, and their applications in cryptography. Learn about proof systems, aggregation, and practical implementations in decentralized systems and internet security.
Explore advanced encryption standards, symmetric key primitives, and lightweight cryptography in this comprehensive overview of symmetric cryptography techniques.
Explore secure messaging principles, challenges, and innovations with expert insights on encryption, surveillance prevention, and system vulnerabilities.
Explore cryptographic primitives in advertising, covering universal psychography, private computation, and challenges in adoption and scaling of privacy-preserving technologies.
Explore advanced encryption standards, lightweight cryptography, and evaluation criteria for symmetric cryptographic systems in this comprehensive overview.
Explore side-channel attacks, including Spectre, timing attacks, and countermeasures. Learn about developer knowledge, resistance techniques, and future directions in cybersecurity.
Get personalized course recommendations, track subjects and courses with reminders, and more.