Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Cybersecurity
Digital Marketing
Generative AI
Understanding Medical Research: Your Facebook Friend is Wrong
Algorithms, Part I
Moralities of Everyday Life
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore quantum money concepts derived from quaternion algebras in this advanced cryptography session from MathCrypt 2022.
Explore norm relations in cyclotomic fields and their applications to cryptography, focusing on finding short vectors in ideals without quantum computers.
Explore cryptographic hash functions derived from arc-transitive graphs, focusing on collision resistance, comparisons with Cayley hash functions, and potential attacks.
Explore efficient supersingularity testing over F_p and CSIDH key validation techniques, including random point tests and product tree methods.
Explore new Icart-type encodings derived from elliptic curve automorphisms, advancing cryptographic techniques and applications in mathematical cryptography.
Explore the Generalized Montgomery Coordinate as a novel computational tool for advancing isogeny-based cryptography in this insightful conference session.
Low-communication algorithms for private federated data analysis, offering optimal accuracy guarantees while preserving privacy in distributed settings.
Explore federated learning with differential privacy guarantees, covering key concepts, challenges, and algorithms like DP-SGD and DP-FTRL, with insights on privacy-utility trade-offs and future directions.
Explore decentralized data science techniques and applications in this comprehensive talk, focusing on simplifying complex concepts for practical implementation.
Privacy-preserving aggregate statistics using Boolean shares, enhancing the Prio system for improved data collection and analysis while maintaining user privacy.
Privacy-preserving federated learning techniques for small weights, focusing on MicroFedML. Explores innovative approaches to enhance data privacy in machine learning collaborations.
Explore the challenges and strategies for transitioning to a post-quantum world in this expert-led round table discussion from the Global Homomorphic Technology Conference.
Explore NIST's post-quantum standardization project, examining its goals, challenges, and potential impact on future cryptographic systems and global cybersecurity.
Explore key insights and takeaways from the Global Humanitarian Technology Conference, focusing on practical applications and future directions in humanitarian technology.
Explore crypto agility for lightweight primitives, discussing adaptability and efficiency in cryptographic systems for resource-constrained environments.
Get personalized course recommendations, track subjects and courses with reminders, and more.