Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Online Education
Marketing
Digital Marketing
Understanding Multiple Sclerosis (MS)
Psychology of Personal Growth
Introducción a la Regulación Emocional basada en Mindfulness
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore multiparty computation concepts, including abstract circuits, applications, and communication complexity, with insights into motivation scenarios and new research developments.
Explore symmetric cryptanalysis techniques, including automatic search methods and meeting-in-the-middle attacks, with insights on GA1 and GA2 cryptanalysis and their implications.
Explore CHERI architecture and its RISC-V implementation, covering hardware principles, software models, and security implications for modern computing systems.
Explore RISC-V security mechanisms, including privilege modes, page tables, and control flow integrity, with insights on current status and future proposals.
Overview of RISC-V security topics, including base ISA, privileged architecture, and security task groups. Explores current developments and future directions in RISC-V security.
Explore sidechannel analysis, incision techniques, and high-level system analysis, focusing on real-world applications like Tesla Model X security vulnerabilities.
Explore cutting-edge cryptographic techniques and protocols, including faster bootstrapping in homomorphic encryption and random obvious transfer for embedded devices.
Explore post-quantum cryptography, focusing on Kyber and masking techniques. Learn about attacks, defenses, and secure implementations in the quantum computing era.
Explore RSA key generation pitfalls, public exponents, and cryptographic padding schemes. Learn about common errors and their implications for security in this comprehensive overview.
Explore effective vehicle-to-vehicle communication strategies, focusing on implicit certificates and third-round candidates for enhanced automotive safety and efficiency.
Explore Pilsung's cryptographic vulnerabilities, focusing on round sub-processes, permutations, and randomness. Learn about distinguishers and weak key detection in this cryptanalysis discussion.
Explore low-complexity cryptography, focusing on MPC-friendly primitives and efficient entropy accumulation. Learn about potential attacks and engage in Q&A.
Explore advanced encryption techniques, including broadcast encryption, attribute-based encryption, and multi-input functional encryption, with a focus on security, limitations, and open problems.
Explore zero-knowledge protocols, their construction, main results, and applications in cryptography. Gain insights into this fundamental concept and its implications.
Explore applied cryptography and side channels, covering efficient searchable symmetric encryption, random probing security, and secure wire shuffling techniques.
Get personalized course recommendations, track subjects and courses with reminders, and more.