Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Computer Science
Psychology
Algorithms and Data Structures
Stanford Introduction to Food and Health
Gamification
Learn to Program: The Fundamentals
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore zero-knowledge proofs, forward secrecy, and their applications in cryptography. Learn about proof systems, aggregation, and practical implementations in decentralized systems and internet security.
Explore advanced encryption standards, symmetric key primitives, and lightweight cryptography in this comprehensive overview of symmetric cryptography techniques.
Explore secure messaging principles, challenges, and innovations with expert insights on encryption, surveillance prevention, and system vulnerabilities.
Explore cryptographic primitives in advertising, covering universal psychography, private computation, and challenges in adoption and scaling of privacy-preserving technologies.
Explore advanced encryption standards, lightweight cryptography, and evaluation criteria for symmetric cryptographic systems in this comprehensive overview.
Explore side-channel attacks, including Spectre, timing attacks, and countermeasures. Learn about developer knowledge, resistance techniques, and future directions in cybersecurity.
Explore advanced techniques in cryptanalysis, focusing on statistical methods to analyze block ciphers and their vulnerabilities, including the sandwich distinguisher approach.
Explore functional encryption, leakage resilient IBA, and encapsulated search indexing. Learn about KDM security, decryption failure, and updatable encryption techniques.
Explore cutting-edge research on physical attacks, information leakage, and countermeasures in cryptography. Gain insights into secure software masking, fault injection, and leakage-resilient designs.
Explore cutting-edge research in multiparty computation, covering topics like homomorphic secret sharing, secure multiplication, garbled function evaluation, and adaptively secure MPC.
Explore advanced cryptographic concepts including onion routing, two-way channels, compliance signatures, and generic group models in this comprehensive technical presentation.
Explore advanced cryptography concepts including derandomization, encryption schemes, differential privacy, and collective coin tossing for secure communication and data protection.
Explore laser fault injection, two-source non-malleable extractors, and non-interactive commit-and-prove techniques in cryptography and security.
Explore post-quantum cryptography, including multivariate trapdoors, key recovery attacks, and quantum algorithms. Learn about blind signatures and their applications in secure communication.
Explore recent developments in zero-knowledge proofs, including applications, models, constructions, and future challenges in this comprehensive talk by Sarah Meiklejohn at Eurocrypt 2021.
Get personalized course recommendations, track subjects and courses with reminders, and more.