Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Computer Science
Information Technology
Data Analysis
The Science of Gastronomy
Transforming Digital Learning: Learning Design Meets Service Design
Intelligenza Artificiale
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Invited talk by cryptography expert Orr Dunkelman, exploring cutting-edge research and insights in the field of cryptographic analysis and design.
Explore provable security, attack models, and encryption techniques in cryptography, covering key concepts like permutation-based PRFs and state resets.
Explore advanced cryptanalysis techniques, focusing on division property precision, algebraic degree, and improved attacks on specific cryptographic systems.
Opening remarks and award paper presentations from the FSE 2022 conference, showcasing cutting-edge research and innovations in software engineering.
Explore SNARKs, NIZKs, and key exchange protocols in cryptography, focusing on their applications, security properties, and implementation challenges.
Explore the evolution, goals, and future of cryptography conferences with insights from Yuliang Zheng, covering key milestones, awards, and challenges in the field.
Explore cryptographic protocols and tools, enhancing your understanding of secure communication systems and encryption techniques.
Explore cryptanalysis techniques and methods for breaking encryption systems, enhancing your understanding of cryptographic vulnerabilities and security measures.
Explore obfuscation techniques, lockable obfuscation, and financial-backed covert security. Delve into lifting standard model reductions and engage in Q&A sessions.
Explore the fundamentals of Multi-Party Computation and Secret Sharing techniques in cryptography, including key concepts, applications, and recent advancements in the field.
Explores advanced topics in cryptography, including attacks on RSA and elliptic curves, analysis of oblivious PRFs, and developments in symmetric key exchange and authenticated key exchange protocols.
Explore cutting-edge encryption techniques and signature schemes in this advanced cryptography session, featuring discussions on flexible pattern matching and adaptive security in attribute-based encryption.
Explore cutting-edge post-quantum cryptography research, including lattice-based encryption, group signatures, and isogeny-based schemes. Gain insights into innovative approaches for secure communication in the quantum era.
Explore zero knowledge proofs, oblivious transfer, and key management techniques in cryptography. Gain insights into advanced security protocols and their applications.
Explore advanced multi-party computation techniques, including adaptive security, efficient arguments, and polynomial commitments. Learn about new results and applications in cryptography.
Get personalized course recommendations, track subjects and courses with reminders, and more.