Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Computer Science
Psychology
Cybersecurity
Greening the Economy: Sustainable Cities
Discover Dentistry
Academic Writing
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore statistical ZAP arguments, covering commitment schemes, correlation intractability, and the Fiat-Shamir transform in cryptography. Gain insights into advanced cryptographic concepts and techniques.
Explore birthday bound attacks on cryptographic constructions, focusing on EWCDMD and SoKAC21. Learn about composition techniques, permutations, and distribution attacks in this advanced cryptography talk.
Explore advanced slide attacks on ciphers with self-similarity, including applications to generic SPNs and 1K-AES variants. Learn about slid sets, suggestive plaintext structures, and substitution slide attacks.
Explore cutting-edge advancements in secure two-party computation, focusing on non-interactive protocols and achieving malicious security while maintaining succinctness.
Explore quantum-secure message authentication through blind-unforgeability, examining results, proofs, and implications for cryptographic security in the quantum era.
Explore rational isogenies derived from irrational endomorphisms in cryptography, covering CSIDH, isogeny graphs, and twisting endomorphisms with applications to post-quantum cryptography.
Explore advanced cryptographic techniques for non-interactive zero-knowledge proofs in pairing-free groups, focusing on improved constructions and weaker assumptions.
Explore quantum attacks on CSIDH cryptosystem, focusing on collimation sieve techniques and their implications for proposed parameters' security in post-quantum cryptography.
Explore cryptographic combiners for functional encryption, focusing on new approaches and challenges in secure multi-party computation and input-local MPC.
Explore advanced techniques for improving key recovery in linear cryptanalysis, focusing on the PRESENT block cipher and introducing novel approaches to enhance attack efficiency.
Explore the formalization of data deletion in machine learning, addressing regulatory challenges and implications for the Right to be Forgotten in this research presentation from Eurocrypt 2020.
Explore cutting-edge applications of convolutional neural networks in profiled side-channel attacks, covering design principles, architecture, and data augmentation techniques.
Explore ECDSA signature vulnerabilities, lattice attacks, and cryptographic weaknesses in real-world scenarios. Learn about countermeasures and implications for secure implementations.
Análisis de seguridad del protocolo SAE en WPA3, explorando vulnerabilidades como ataques de tiempo, curva inválida y denegación de servicio, con énfasis en problemas fundamentales sin resolver.
Explore automated techniques for developing chosen ciphertext attacks in cryptography, including format oracles, theory solvers, and practical examples like PKCS #7 and bitwise padding.
Get personalized course recommendations, track subjects and courses with reminders, and more.