Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Computer Science
Information Technology
Data Analysis
The Science of Gastronomy
Transforming Digital Learning: Learning Design Meets Service Design
Intelligenza Artificiale
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore zero knowledge and proof systems, delving into cryptographic concepts that enable verification without revealing sensitive information.
Explore advanced cryptographic concepts including Function Encryption, PostQuantum Secure IO, and Attribute Encryption. Delve into disappearing cryptography and direct hardness.
Explore the fundamentals and applications of Multi-party Computation, a cryptographic protocol enabling secure collaborative computations while preserving data privacy.
Explore secure multiparty computation and garbled circuits, advanced cryptographic techniques for privacy-preserving collaborative computations and secure function evaluation.
Explore blockchain technology's impact on privacy and law enforcement, examining challenges and opportunities in this rapidly evolving field.
Explore advanced cryptographic concepts: Zero Knowledge proofs, Property-Preserving Hashing, and Oblivious RAM (ORAM). Gain insights into cutting-edge techniques for secure data storage and privacy-preserving computations.
Explore symmetric designs, leakage-resilience, and cryptographic concepts like round functions, key schedules, and password hashing in this comprehensive talk on advanced security techniques.
Explore quantum constructions and proofs, delving into advanced concepts and methodologies in quantum computing and cryptography.
Explore isogenies and lattices in cryptography, covering twin smooth integers, polynomials, delayed encryption, sealed bid auctions, and lattice-based techniques for enhanced security.
Comprehensive overview of fully homomorphic encryption's evolution, exploring its journey from concept to practical tool, examining various schemes, and discussing future directions in the field.
Explore implementation challenges in cryptography, focusing on whitebox implementations, masking techniques, and secret sharing strategies. Gain insights into advanced security measures and research developments.
Explore fully homomorphic encryption (FHE) and its applications in input/output operations, focusing on advanced cryptographic techniques and their practical implementations.
Explore public key cryptography and isogenies, covering security notions, prime order groups, key exchange, threshold encryption, and attribute-based encryption.
Explore RISC-V cryptography extensions, their current status, and future developments with insights from Ben Marshall of University of Bristol and PQShield.
Explore co-design and co-verification of masked software implementations on CPUs, focusing on physical side-channel attacks, hardware/software gaps, and innovative solutions.
Get personalized course recommendations, track subjects and courses with reminders, and more.