Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Management & Leadership
Web Development
Digital Marketing
Extreme Geological Events
Teaching Young Learners Online
IngenierÃa de aeropuertos: diseño del lado aire según OACI (ICAO)
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore cryptographic techniques to eliminate the Strong RSA Assumption in integer-based arguments, enhancing security and efficiency in cryptographic protocols.
Explore indistinguishability obfuscation for evolving software, focusing on patchable techniques, multi-program applications, and cryptographic implications in this advanced cryptography presentation.
Explore cryptographic breakthroughs in obfuscation, functional encryption, and non-interactive key exchange. Discover innovative techniques and applications pushing the boundaries of secure communication.
Explore quantum cryptography techniques for secure communication, focusing on key recycling methods in encryption and authentication protocols.
Explore cryptanalysis techniques for branching program obfuscators, examining vulnerabilities and potential attacks on these cryptographic constructions.
Explore lattice-based SNARGs and their role in enhancing obfuscation efficiency. Learn about multilinear maps, bootstrapping, and linear PCPs in cryptography.
Explore quantum authentication techniques that allow for key recycling, enhancing cryptographic security and efficiency in quantum communication systems.
Explore quantum-resistant zero-knowledge protocols for NP problems, focusing on relativistic and two-prover approaches. Gain insights into Sigma protocols and their applications in cryptography.
Explore advanced techniques for faster and more secure two-party computation, focusing on single execution settings and improvements to existing protocols.
Explore innovative cryptographic techniques for secure multi-challenge scenarios, including hash proof systems, randomization, and adaptive partitioning strategies.
Explore computational integrity using quasi-linear PCPs and public randomness. Learn about protocol design, low-degree testing, and cryptographic assumptions in this advanced cryptography talk.
Explore non-interactive secure two-party computation techniques, including offline/online protocols and batch settings, with focus on Yao's garbled circuits and cut-and-choose methods.
Explore the balance between theoretical ideals and practical realities in cryptography with insights from expert Nigel Smart's Eurocrypt 2017 presentation.
Explore MQ-based cryptography, transitioning from 5-pass identification schemes to signature systems. Learn about advancements in post-quantum cryptographic techniques.
Explore advanced cryptographic techniques with a focus on structure-preserving smooth projective hashing, presented by experts at Asiacrypt 2016.
Get personalized course recommendations, track subjects and courses with reminders, and more.