Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Computer Science
Psychology
Online Education
Mechanics of Materials I: Fundamentals of Stress & Strain and Axial Loading
Fractals and Scaling
Bacterial Genomes II: Accessing and Analysing Microbial Genome Data Using Artemis
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore advanced masking schemes and analytical techniques for enhancing cryptographic security in hardware implementations.
Explore cryptographic library developers' perspectives on timing attacks and their mitigation strategies in this insightful conference session.
Explore cutting-edge cryptography insights with Yehuda Lindell's expert talk, offering valuable perspectives on current trends and future directions in the field.
Explore four attacks on Telegram and a proof, delving into vulnerabilities and security considerations for this popular messaging platform.
Explore how power side-channel attacks transform into remote timing attacks on x86 processors, examining DVFS, frequency leakage, and implications for cryptographic systems like SIKE.
Explore quantum money concepts derived from quaternion algebras in this advanced cryptography session from MathCrypt 2022.
Explore norm relations in cyclotomic fields and their applications to cryptography, focusing on finding short vectors in ideals without quantum computers.
Explore cryptographic hash functions derived from arc-transitive graphs, focusing on collision resistance, comparisons with Cayley hash functions, and potential attacks.
Explore efficient supersingularity testing over F_p and CSIDH key validation techniques, including random point tests and product tree methods.
Explore new Icart-type encodings derived from elliptic curve automorphisms, advancing cryptographic techniques and applications in mathematical cryptography.
Explore the Generalized Montgomery Coordinate as a novel computational tool for advancing isogeny-based cryptography in this insightful conference session.
Low-communication algorithms for private federated data analysis, offering optimal accuracy guarantees while preserving privacy in distributed settings.
Explore federated learning with differential privacy guarantees, covering key concepts, challenges, and algorithms like DP-SGD and DP-FTRL, with insights on privacy-utility trade-offs and future directions.
Explore decentralized data science techniques and applications in this comprehensive talk, focusing on simplifying complex concepts for practical implementation.
Privacy-preserving aggregate statistics using Boolean shares, enhancing the Prio system for improved data collection and analysis while maintaining user privacy.
Get personalized course recommendations, track subjects and courses with reminders, and more.