Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Management & Leadership
Web Development
Digital Marketing
Extreme Geological Events
Teaching Young Learners Online
IngenierÃa de aeropuertos: diseño del lado aire según OACI (ICAO)
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore advanced cryptographic concepts of selective opening security and simulatable data encapsulation in this technical talk from Asiacrypt 2016.
Explore advanced cryptographic techniques for secure public key encryption, focusing on efficient KDM CCA security for polynomial functions.
Explore cryptographic techniques for zero-knowledge proofs, accumulators, and set operations in this advanced talk on secure data structures and privacy-preserving protocols.
Explore cryptographic security against selective opening attacks, considering scenarios with imperfect randomness generation and their implications for secure communication.
Explore digital signatures based on ideal lattice problems across all rings, examining their security and efficiency in cryptographic applications.
Explore collapse binding quantum commitments, including collapsed hash functions and techniques for hashing long messages, without relying on random oracles.
Explore the evolution from 5-pass MQ-based identification to efficient MQ-based signatures, covering conversion techniques, signature schemes, and size reduction strategies.
Explore zero-knowledge proofs for matrix-vector relations and lattice-based group encryption, covering Stern's ideas and techniques for handling quadratic relations in cryptography.
Explore the security aspects of supersingular isogeny cryptosystems, examining potential vulnerabilities and cryptographic implications in this advanced mathematical discussion.
Explore a novel polynomial selection technique and its impact on asymptotic complexities in cryptography, presented by experts at Asiacrypt 2016.
Explore advancements in fully homomorphic encryption, focusing on accelerated bootstrapping techniques and their impact on cryptographic efficiency and security.
Explore cryptographic deployments on the Internet, focusing on Diffie-Hellman key exchange, implementation flaws, policy impacts, and lessons for better security practices.
Explore the feasibility and limitations of fuzzy extractors in cryptography, examining their potential applications and theoretical foundations.
Explore cryptanalysis techniques for round-reduced Keccak, focusing on linear structures and their applications in breaking this widely-used hash function.
Explore a memory-hard function that offers proven defense against sequential attacks, enhancing cryptographic security and computational resilience.
Get personalized course recommendations, track subjects and courses with reminders, and more.