Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Online Education
Marketing
Digital Marketing
Understanding Multiple Sclerosis (MS)
Psychology of Personal Growth
Introducción a la Regulación Emocional basada en Mindfulness
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore succinct arguments in cryptography, covering proof-carrying data, subquadratic SNARKs, and applications. Learn about universal SNARKs, signature schemes, and performance comparisons.
Explore lattice cryptanalysis techniques, barriers, and implementations with expert insights from leading researchers in the field.
Explore multiparty quantum computations, one-way functions, and obfuscation in this advanced continuation of quantum cryptography concepts.
Explore the Raccoon Attack on TLS-DH(E), its impact on cryptographic protocols, and potential countermeasures. Learn about side-channel vulnerabilities in key derivation processes.
Explore partitioning oracle attacks in cryptography, focusing on authenticated encryption, key multi-collisions, and vulnerabilities in protocols like Shadowsocks and OPAQUE.
Explore fault attacks on lattice-based key encapsulation mechanisms, focusing on Kyber and Saber. Learn about implementation security, attack strategies, and potential countermeasures.
Explore small-subgroup attacks on distributed systems, focusing on MPC implementation vulnerabilities and real-world implications for cryptographic protocols and distributed key generation.
Explore password recovery attacks on SRP implementations, focusing on FLUSH+RELOAD techniques, modular exponentiation vulnerabilities, and mitigation strategies for cryptographic systems.
Explore cryptographic protocols, secure computation, and their applications in communication. Delve into PRFs, gap assumptions, and two-party computation concepts.
Explore cryptographic primitives including universal proxy encryption, linear secret sharing, and secure deterministic encryption in this comprehensive presentation.
Explore efficient group signatures, their construction, and applications in user-controlled and sequential linkability. Learn about key developments and contributions in this cryptographic field.
Explore threshold wallets, Cardano's consensus layer, and randomness beacons in cryptocurrency. Learn about vulnerabilities, exploits, and the interplay between theory and implementation.
Explore Cardano's consensus layer, from theoretical foundations to practical implementation, covering distributed computation, transaction ledgers, network protocols, and formal verification techniques.
Explore computer-aided cryptography, symbolic verification, and verifiable primitives in this comprehensive analysis of formal methods in cryptographic design and security.
Explore zero knowledge proofs, their applications, and advanced concepts like crowd verifiable protocols and non-interactive composition in cryptography.
Get personalized course recommendations, track subjects and courses with reminders, and more.