Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Cybersecurity
Digital Marketing
Generative AI
Understanding Medical Research: Your Facebook Friend is Wrong
Algorithms, Part I
Moralities of Everyday Life
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore cutting-edge research on side channel attacks targeting post-quantum cryptographic implementations, presented at CHES 2022 conference.
Explore cutting-edge research on lattice-based cryptography security, focusing on difficulty estimation techniques for breaking these advanced encryption systems.
Explore cutting-edge Number Theoretic Transform implementations in cryptography, discussing optimizations and applications for enhanced security and performance.
Explore cutting-edge techniques in cryptographic hardware security, focusing on leakage resilience and masking verification methods for enhanced protection against side-channel attacks.
Explore cutting-edge techniques in microarchitectural leakage modeling, enhancing cybersecurity knowledge and skills for advanced hardware security analysis and protection.
Explore cutting-edge hardware implementations for post-quantum cryptography, focusing on efficiency and security in the era of quantum computing.
Engaging cryptography discussion featuring rapid-fire presentations on cutting-edge research, innovative ideas, and emerging trends in hardware and embedded systems security.
Exploring the CHES 2022 Test of Time Award: Recognizing groundbreaking cryptographic hardware and embedded systems research with lasting impact.
Explore cutting-edge implementations of post-quantum cryptographic schemes, focusing on speed and efficiency in the context of emerging quantum computing threats.
Explore advanced tools and techniques for Side-Channel Analysis (SCA) and cryptanalysis, enhancing your understanding of hardware security and cryptographic vulnerabilities.
Explore advanced masking schemes and analytical techniques for enhancing cryptographic security in hardware implementations.
Explore cryptographic library developers' perspectives on timing attacks and their mitigation strategies in this insightful conference session.
Explore cutting-edge cryptography insights with Yehuda Lindell's expert talk, offering valuable perspectives on current trends and future directions in the field.
Explore four attacks on Telegram and a proof, delving into vulnerabilities and security considerations for this popular messaging platform.
Explore how power side-channel attacks transform into remote timing attacks on x86 processors, examining DVFS, frequency leakage, and implications for cryptographic systems like SIKE.
Get personalized course recommendations, track subjects and courses with reminders, and more.