Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Computer Science
Psychology
Cybersecurity
Greening the Economy: Sustainable Cities
Discover Dentistry
Academic Writing
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore innovative cryptographic techniques using symbolic encryption and pseudorandom keys, enhancing security in modern cryptographic systems.
Explore new schemes for verifiable delegated quantum computation, featuring quasilinear resources and enhanced security in this cutting-edge cryptography research presentation.
Explore the foundations and intricacies of Fully Homomorphic Encryption in this comprehensive talk by Daniele Micciancio, delving into advanced cryptographic concepts and their applications.
Explore differential privacy mechanisms, applications, and challenges in data protection. Insights from Cynthia Dwork on privacy-preserving techniques, real-world implementations, and future directions.
Live stream featuring discussions and presentations on cutting-edge cryptography research, trends, and applications in information security.
Explore techniques for recovering affine encodings in white-box cryptography implementations, focusing on security analysis and potential vulnerabilities in cryptographic systems.
Explore cryptographic vulnerabilities in lattice-based schemes, focusing on cold boot attacks against Ring and Module LWE keys transformed by the Number Theoretic Transform.
Explore a lightweight authenticated encryption mode for resource-constrained devices, offering security and efficiency in cryptographic operations.
Explore electromagnetic analysis in IoT, focusing on Thread protocol vulnerabilities. Learn key insights from a real-world attack and its implications for IoT security.
Cryptographic hardware and embedded systems experts present cutting-edge research and innovations in a rapid-fire format, covering diverse topics in security and cryptography.
Explores hardware design for efficient polynomial multiplication in Somewhat Homomorphic Encryption, focusing on Residue Number System and data flow optimization techniques.
Explores challenges in finite state machine-based hardware obfuscation, analyzing vulnerabilities and proposing potential countermeasures for enhanced security in digital circuit design.
Explores hardware-based obfuscation techniques for constant expressions, presenting a novel approach with minimal overhead. Discusses applications in watermarking and security.
Explore linear repairing codes and side channel attacks in cryptography, covering security issues, shading schemes, and practical applications through experiments and observations.
Explore rotational symmetry in FPGA-specific AES implementation, focusing on innovative approaches to enhance efficiency and side-channel protection in cryptographic designs.
Get personalized course recommendations, track subjects and courses with reminders, and more.