Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Management & Leadership
Web Development
Digital Marketing
Extreme Geological Events
Teaching Young Learners Online
IngenierÃa de aeropuertos: diseño del lado aire según OACI (ICAO)
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore the round complexity of self-composable two-party computation, examining concurrent, consecutive, and XP security models, with insights on overall approach and technical aspects.
Explore optimizations for group-based secure computation, focusing on rounds, communication, and computation efficiency. Learn about homomorphic secret sharing and cryptographic frameworks.
Explores fine-grained blackbox separations between semantic and circular security notions in cryptography, discussing encryption, seed circular security, and fully blackbox constructions.
Explore depth robust graphs and their cumulative memory complexity, examining theoretical foundations and practical implications for cryptographic applications.
Explore derandomization techniques for achieving perfect correctness in cryptographic schemes, focusing on public-key encryption and the concept of cryptographic strings.
Explore cryptographic techniques for strengthening random oracle models against auxiliary input attacks, enhancing security in various cryptographic applications.
Explore cutting-edge research on cryptographic systems that can be securely updated, presented at Eurocrypt 2017. Delve into innovative approaches for maintaining security in evolving digital environments.
Explore the distinction between semantic and circular security in symmetric key bit encryption, examining theoretical foundations and practical implications.
Explore the memory-hardness of Scrypt, a cryptographic function, through an in-depth analysis of its time complexity, technical barriers, and strategic implications.
Explore innovative cryptographic techniques for constructing public-seed pseudorandom permutations, enhancing security and efficiency in various applications.
Explore a novel tool for impossible differential cryptanalysis, enhancing block cipher design and analysis. Learn about its applications, strengths, and implications for cryptographic security.
Explore advanced cryptographic techniques for efficient and secure searchable encryption, focusing on worst-case sub-linear complexity and innovative data structures.
Explore innovative blockchain-based micropayment systems that ensure user privacy and efficient transactions without intermediaries.
Explore post-quantum cryptography, hidden shift problems, and secure symmetric key systems. Delve into Simons algorithm and coset sampling for advanced cryptographic insights.
Explore the cryptographic concept of double encryption and its implications for multi-user security in this research presentation from Eurocrypt 2017.
Get personalized course recommendations, track subjects and courses with reminders, and more.