Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Computer Science
Psychology
Cybersecurity
Greening the Economy: Sustainable Cities
Discover Dentistry
Academic Writing
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explores techniques to correct subverted random oracles in cryptography, addressing security vulnerabilities and proposing solutions for preventing attacks on hash functions and chain takeovers.
Explore verifiable delay functions, their security properties, and applications in random beacons and stock price manipulation prevention. Learn about various constructions and optimizations.
Explore threshold cryptosystems derived from threshold fully homomorphic encryption, covering key management, signatures, and public key encryption, with insights on security definitions and techniques.
Explore quantum supremacy, certified randomness, and their implications in cryptography with Scott Aaronson's insightful presentation on cutting-edge quantum computing concepts.
Explore the intersection of cryptography and machine learning, examining challenges, impacts, and future directions in digital privacy, adversarial learning, and quantum resilience.
Explore statistical witness indistinguishability in interactive proofs, focusing on reducing interaction while maintaining secrecy and statistical zero knowledge.
Explores new techniques for secure password storage and authentication, including distribution-sensitive secure sketches and popularity proportional hashing, to enhance security against online and offline attacks.
Explore information theoretic indistinguishability using the Chi squared method, covering problem overview, description, and conclusions in cryptography research.
Explores indifferentiability of iterated Even-Mansour ciphers with non-idealized key schedules, presenting novel approaches and strategies for enhancing block cipher security.
Explores key rotation techniques for authenticated encryption, discussing hybrid approaches, confidentiality, secret sharing, and attack models. Analyzes performance and concludes with insights.
Explore Bitcoin's transaction ledger through a composable treatment, examining block structure, functionality, and key concepts in blockchain technology.
Explore ratcheted encryption and key exchange in secure messaging, covering concepts, generic compilation, and a tricky exchange implementation with motivation and proof.
Explore cutting-edge developments in cryptographic proof systems at this IACR conference session, featuring expert presentations on recent advancements and theoretical breakthroughs.
Opening remarks and talks on theoretical cryptography foundations, covering topics like pseudorandom generators, one-way functions, key-alternating ciphers, public-key encryption, and verifiable outsourcing.
Explore cryptographic concepts and advancements with Iftach Haitner's insightful presentation at the Theory of Cryptography Conference 2023.
Get personalized course recommendations, track subjects and courses with reminders, and more.