Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Computer Science
Psychology
Online Education
Mechanics of Materials I: Fundamentals of Stress & Strain and Axial Loading
Fractals and Scaling
Bacterial Genomes II: Accessing and Analysing Microbial Genome Data Using Artemis
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore advanced cryptanalysis techniques, including leakage resilience, quantum period sign problems, and differential cryptanalysis, to enhance your understanding of cryptographic security.
Explore cutting-edge cryptography insights with Christian Rechberger's invited talk, delving into advanced concepts and potential future developments in the field.
Explore provable security concepts, focusing on length-independent security bounds and their implications for cryptographic systems.
Explore innovative cryptographic designs and efficient implementation strategies for enhanced security and performance.
Explore cryptanalysis techniques for hash functions, including inner collision attacks, preimage attacks, and quantum collision attacks on various cryptographic constructions.
Invited talk by cryptography expert Orr Dunkelman, exploring cutting-edge research and insights in the field of cryptographic analysis and design.
Explore provable security, attack models, and encryption techniques in cryptography, covering key concepts like permutation-based PRFs and state resets.
Explore advanced cryptanalysis techniques, focusing on division property precision, algebraic degree, and improved attacks on specific cryptographic systems.
Opening remarks and award paper presentations from the FSE 2022 conference, showcasing cutting-edge research and innovations in software engineering.
Explore SNARKs, NIZKs, and key exchange protocols in cryptography, focusing on their applications, security properties, and implementation challenges.
Explore the evolution, goals, and future of cryptography conferences with insights from Yuliang Zheng, covering key milestones, awards, and challenges in the field.
Explore cryptographic protocols and tools, enhancing your understanding of secure communication systems and encryption techniques.
Explore cryptanalysis techniques and methods for breaking encryption systems, enhancing your understanding of cryptographic vulnerabilities and security measures.
Explore obfuscation techniques, lockable obfuscation, and financial-backed covert security. Delve into lifting standard model reductions and engage in Q&A sessions.
Explore the fundamentals of Multi-Party Computation and Secret Sharing techniques in cryptography, including key concepts, applications, and recent advancements in the field.
Get personalized course recommendations, track subjects and courses with reminders, and more.