Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Computer Science
Psychology
Cybersecurity
Greening the Economy: Sustainable Cities
Discover Dentistry
Academic Writing
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore cryptographic protocol security, focusing on active security complexity in secure multiparty computation. Learn about new compilers, communication complexity, and open problems in the field.
Explore multi-instance security and scaling behavior of cryptographic schemes, focusing on key-encapsulation mechanisms and CDH-type problems in public-key encryption.
Explore fault template attacks on block ciphers, leveraging fault propagation to bypass countermeasures. Learn about innovative cryptographic techniques and their implications for security.
Explore algebraic attacks on rank metric code-based cryptosystems, examining the McEliece system, rank decoding, and theoretical security implications for various cryptographic schemes.
Explore advanced cryptanalysis techniques, focusing on the Retracing Boomerang Attack and its variants. Learn about block ciphers, differential attacks, and applications to AES.
Explore statistical zaps, new oblivious transfer protocols, and their applications in cryptography. Delve into interactive proof systems, witness indistinguishability, and statistical security in two-party protocols.
Explore advanced cube attack techniques for cryptanalysis, focusing on three-subset division property modeling and its applications to stream ciphers like Trivium.
Explore quantum security analysis of CSIDH, a key exchange protocol, covering cryptanalysis principles, cost models, and quantum algorithms for potential attacks.
Explore quantum algorithms for k-xor and k-sum problems, focusing on optimal merging techniques and their impact on computational complexity in cryptography.
Explore techniques for modifying block ciphers, focusing on security implications and performance enhancements in cryptographic algorithms.
Explore quantum multi-party computation protocols, focusing on Clifford codes, authentication tests, and magic-state generation for secure computations with dishonest participants.
Explore advanced cryptographic techniques for efficient and secure zero-knowledge proofs, focusing on Marlin's innovative approach to preprocessing zkSNARKs with universal and updatable setups.
Explore automatic generation of secure masked bitsliced implementations for cryptographic algorithms, addressing probing attacks and enhancing performance in hardware security.
Explore the hardness of Learning with Errors (LWE) on general entropic distributions, examining noise-lossiness and its implications for cryptographic security in various scenarios.
Explore advanced cryptographic techniques for disjunctive zero-knowledge proofs, focusing on stacked garbling and its applications in secure computation and privacy-preserving protocols.
Get personalized course recommendations, track subjects and courses with reminders, and more.