Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Computer Science
Psychology
Online Education
Mechanics of Materials I: Fundamentals of Stress & Strain and Axial Loading
Fractals and Scaling
Bacterial Genomes II: Accessing and Analysing Microbial Genome Data Using Artemis
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore groundbreaking research on Oblivious RAM, uncovering a significant lower bound that challenges previous assumptions and advances our understanding of secure data access patterns.
Explore constrained pseudorandom functions for NC1 circuits in traditional groups, advancing cryptographic techniques for secure computation and access control.
Explore the Dissection BKW algorithm, a cryptographic technique presented at Crypto 2018, and its implications for solving the Learning with Errors problem.
Learn about adaptively secure garbling schemes with near-optimal online complexity, exploring key concepts, techniques, and their significance in cryptography and secure computation.
Explore innovative techniques for enhancing privacy and security in concurrent computations, focusing on black-box protocols and their applications in cryptography.
Explore advanced cryptographic techniques: obfuscation, functional encryption, and their applications in building secure systems. Gain insights from cutting-edge research presented at Eurocrypt 2018.
Explore the intersection of sum-of-squares and program obfuscation, examining limitations of low-degree pseudorandom generators in cryptography and complexity theory.
Explore the intricacies of three-round zero-knowledge proofs, delving into complexity, compression, and verification methods in cryptography.
Explore an efficiency-preserving transformation in cryptography, presented at Eurocrypt 2018, delving into advanced concepts and their implications for secure systems.
Explore the evolution of digital currencies from Digicash to blockchain, examining successes, failures, and future challenges in cryptocurrency development and adoption.
Explore efficient designated-verifier non-interactive zero-knowledge proofs of knowledge, covering NIZK landscapes, compilers, and novel techniques for cryptographic protocol design.
Explore quasi-optimal SNARGs and linear multi-prover interactive proofs in cryptography, covering key concepts, implementations, and open challenges in this cutting-edge field.
Explore supersingular isogeny graphs and endomorphism rings, discussing their applications in cryptography and potential vulnerabilities to quantum computing attacks.
Explore innovative cryptographic techniques for secure key exchange using fuzzy passwords, including applications, constructions, and privacy-correctness tradeoffs in dual execution scenarios.
Explore innovative cryptographic techniques for efficient forward-secret 0-RTT key exchange using Bloom Filter Encryption, as presented at Eurocrypt 2018.
Get personalized course recommendations, track subjects and courses with reminders, and more.