Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Computer Science
Psychology
Cybersecurity
Greening the Economy: Sustainable Cities
Discover Dentistry
Academic Writing
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore fast homomorphic evaluation techniques for deep discretized neural networks, focusing on digit recognition and addressing challenges in activation and dynamic message space.
Explore advanced techniques for secure multi-party computation, focusing on fast, large-scale protocols resistant to malicious adversaries. Learn about cheating detection, optimization, and efficient sum-of-products computation.
Explores techniques to correct subverted random oracles in cryptography, addressing security vulnerabilities and proposing solutions for preventing attacks on hash functions and chain takeovers.
Explore verifiable delay functions, their security properties, and applications in random beacons and stock price manipulation prevention. Learn about various constructions and optimizations.
Explore threshold cryptosystems derived from threshold fully homomorphic encryption, covering key management, signatures, and public key encryption, with insights on security definitions and techniques.
Explore quantum supremacy, certified randomness, and their implications in cryptography with Scott Aaronson's insightful presentation on cutting-edge quantum computing concepts.
Explore the intersection of cryptography and machine learning, examining challenges, impacts, and future directions in digital privacy, adversarial learning, and quantum resilience.
Explore statistical witness indistinguishability in interactive proofs, focusing on reducing interaction while maintaining secrecy and statistical zero knowledge.
Explores new techniques for secure password storage and authentication, including distribution-sensitive secure sketches and popularity proportional hashing, to enhance security against online and offline attacks.
Explore information theoretic indistinguishability using the Chi squared method, covering problem overview, description, and conclusions in cryptography research.
Explores indifferentiability of iterated Even-Mansour ciphers with non-idealized key schedules, presenting novel approaches and strategies for enhancing block cipher security.
Explores key rotation techniques for authenticated encryption, discussing hybrid approaches, confidentiality, secret sharing, and attack models. Analyzes performance and concludes with insights.
Explore Bitcoin's transaction ledger through a composable treatment, examining block structure, functionality, and key concepts in blockchain technology.
Explore ratcheted encryption and key exchange in secure messaging, covering concepts, generic compilation, and a tricky exchange implementation with motivation and proof.
Explore cutting-edge advancements in non-interactive secure multi-party computation, including reusable NISC, witness encryption, and overcoming limitations in two-party and multi-party settings.
Get personalized course recommendations, track subjects and courses with reminders, and more.