Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Online Education
Marketing
Digital Marketing
Understanding Multiple Sclerosis (MS)
Psychology of Personal Growth
Introducción a la Regulación Emocional basada en Mindfulness
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore lattice-based cryptography, focusing on NewHope algorithm, hardware designs, and optimizations for post-quantum cryptography implementation.
Explore machine learning fundamentals, methodologies, and applications in this comprehensive overview, from theoretical foundations to practical implementations.
Explore PUFs and white-box cryptography, focusing on security goals, performance evaluation, and practical applications in modern cryptographic systems.
Explore side-channel attack theory, evaluation methods, and countermeasures in cryptography, focusing on masking techniques and optimization strategies.
Explore secure distance measurement techniques for car locks, contact tracing, and navigation. Learn about ultrawide band, physical layer security, and time-of-flight concepts.
Explore advanced multiparty computation techniques, including stacked garbling and improved primitives, in this in-depth presentation and discussion.
Explore cryptanalysis techniques, focusing on discrete logarithm problems in finite fields. Learn about L notation, historical developments, and computational complexity.
Explore pseudorandom quantum states, efficient correlations, and bullet proofs in this advanced cryptography discussion on post-quantum security.
Explore leakage and outsourced encryption, focusing on random probing security and leakage resilient NAT. Gain insights into cutting-edge cryptographic techniques and their applications.
Explore cryptography's foundations, models, and ethical implications with Silvio Micali in this thought-provoking conference talk on the intersection of technology and morality.
Explore the history, evolution, and challenges of IPsec with Steven Bellovin, covering its structure, protocols, and impact on network security.
Explore Bluetooth randomness, RNG variants, and security implications in firmware. Insights on PRNG, cloud data, MITM attacks, and recent patches for cryptographic enthusiasts.
Explore techniques for breaking PDF encryption, including content overlay, form exfiltration, and malleability gadgets. Learn about attacker models, encryption gaps, and potential mitigations.
Explore TPM vulnerabilities, timing attacks, and lattice-based cryptanalysis. Learn about ECDSA nonce issues and their impact on digital signatures in trusted computing.
Explore vulnerabilities in CTR_DRBG cryptographic algorithm, focusing on cache attacks and key rotation flaws. Learn about potential risks in TLS handshakes and SGX execution.
Get personalized course recommendations, track subjects and courses with reminders, and more.