Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Online Education
Marketing
Digital Marketing
Understanding Multiple Sclerosis (MS)
Psychology of Personal Growth
Introducción a la Regulación Emocional basada en Mindfulness
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Expert panel explores cryptographic standardization challenges, balancing innovation with adoption, security models, and industry needs. Insights on prioritization, incentives, and creating effective standards for advanced cryptography.
Overview of ZKProof standardization efforts, challenges, and progress towards composable security for succinct non-interactive zero-knowledge proofs, with implications for emerging standards.
Explore computer-aided verification and software synthesis for secure multi-party computation protocols, focusing on high-assurance implementations and formal proofs using EasyCrypt and automated toolchains.
Explore quantum multi-collision finding, its complexity, and comparison to classical methods. Learn about "The Reciprocal Plus 1" rule and quantum lazy sampling techniques.
Explore quantum cryptography concepts like no-cloning, quantum money, and lightning, with applications to blockchain and commitment schemes. Discusses limitations and potential constructions.
Explore cryptographic blind signatures, their security, and applications in anonymous systems through a modular treatment based on identification schemes.
Explore verifiable delay functions, their requirements, and cryptographic implementations. Learn about time lock puzzles, succinct proofs, and security assumptions in this advanced cryptography topic.
Explore efficient circuit-based Private Set Intersection techniques with linear communication, applicable to Google Ads and Google Pay, featuring oblivious PRF and optimization strategies.
Explore secure cryptographic implementations, focusing on transparency, AES, leakage functions, masking techniques, and authenticated encryption. Gain insights into challenges and open problems in the field.
Explore efficient implementation of Saber, a lattice-based key encapsulation mechanism, on ARM Cortex-M0 and M4 processors, focusing on optimization techniques and performance analysis.
Explore innovative techniques for optimizing AES S-box implementation, focusing on logic minimization, exponentiation, and output multipliers to achieve record-breaking performance.
Explores persistent fault analysis on block ciphers, discussing attack methods, countermeasures, and experimental results. Provides insights for cryptography researchers and security professionals.
Explore the connection between laconic zero-knowledge proofs and public key cryptography, examining key concepts, results, and implications for cryptographic systems.
Explore fast homomorphic evaluation techniques for deep discretized neural networks, focusing on digit recognition and addressing challenges in activation and dynamic message space.
Explore advanced techniques for secure multi-party computation, focusing on fast, large-scale protocols resistant to malicious adversaries. Learn about cheating detection, optimization, and efficient sum-of-products computation.
Get personalized course recommendations, track subjects and courses with reminders, and more.