Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Computer Science
Information Technology
Data Analysis
The Science of Gastronomy
Transforming Digital Learning: Learning Design Meets Service Design
Intelligenza Artificiale
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore timing side-channel vulnerabilities in CPUs and potential solutions with expert Ronan Lashermes from INRIA. Gain insights into this critical cybersecurity topic.
Explore post-quantum cryptography advancements and gain insights from CHES 2021 conference closing remarks, advancing your understanding of cutting-edge cryptographic technologies.
Explore various cyber attacks and defense strategies, enhancing your understanding of information security and protective measures in the digital landscape.
Explore symmetric cryptography design, implementation, attacks, and defense strategies in this comprehensive overview of modern encryption techniques and security challenges.
Explore machine learning techniques for side-channel attacks, enhancing cybersecurity knowledge and practical skills in this cutting-edge field of information security.
Explore white box cryptography, obfuscation techniques, and logic locking methods to enhance hardware and software security against reverse engineering and tampering.
Explore the CHES Test-of-Time Award, its background, and the impact of the winning paper on cryptographic notation, discoveries, and applications.
Explore advanced concepts in post-quantum cryptography, focusing on cutting-edge techniques and algorithms designed to withstand quantum computing threats.
Explore machine learning applications for Physical Unclonable Functions, addressing challenges in simulation, optimization, and security while examining various attack strategies.
Explore attacks on classical public key cryptography, examining vulnerabilities and countermeasures in widely-used encryption systems.
Explore advanced techniques in cryptographic masking, focusing on enhancing security and protecting sensitive data from side-channel attacks.
Explore cutting-edge techniques for efficient secure computation with renowned cryptographer Yuval Ishai in this insightful PPML 2021 invited talk.
Explore privacy challenges and solutions in large-scale federated learning systems with experts Gascon, Kairouz, and Bonawitz, discussing cutting-edge techniques for secure collaborative machine learning.
Explore cryptographic principles for enhancing machine learning trustworthiness, focusing on security, privacy, and robustness in AI systems.
Explore iterated inhomogeneous polynomials and their applications in cryptography, including VDFs, group actions, and Diffie-Hellman protocols.
Get personalized course recommendations, track subjects and courses with reminders, and more.