Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Online Education
Marketing
Digital Marketing
Understanding Multiple Sclerosis (MS)
Psychology of Personal Growth
Introducción a la Regulación Emocional basada en Mindfulness
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore lattice-based cryptography, focusing on memory optimization, security, and asymmetry tweaks. Learn about modular approaches and security reductions in this advanced cryptographic field.
Explore cryptographic primitives including witness maps, efficient reductive signatures, constraint PRFs, and chameleon hash functions. Dive into applications, state-of-the-art techniques, and advanced concepts.
Explore witness indistinguishability and boosting variable computation on encrypted data in this advanced cryptography presentation.
Explore functional encryption and identity-based encryption concepts, including attribute-based encryption, adaptive security, and verifiability in cryptographic systems.
Explore witness maps in cryptography, covering compact, unique, and dual-mode variants. Learn applications like deterministic signatures and puncturable digital signatures.
Explore a novel three-round UC OT extension protocol, offering improved efficiency and security for secure two-party computation in cryptographic applications.
Explore witness indistinguishability in single-round arguments and its applications to access control, presented by Brakerski and Kalai at PKC 2020.
Explore verifiable inner product encryption, addressing conflicting requirements and constructing LPD encryption algorithms for enhanced security and verification in cryptographic applications.
Explores security of RSA-OAEP encryption without random oracles, introducing new notions like extractable functions and XOR-IND to achieve IND-CCA2 security under standard assumptions.
Exploration of QA-NIZK in the BPK model, discussing soundness, subversion security, and new results for Kiltz-Wee QA-NIZK, with implications for persistent zero-knowledge.
Explore key-dependent message security and master-key KDM-secure identity-based encryption in this presentation on advanced cryptographic techniques using pairings.
Explore threshold ring signatures, including new definitions and post-quantum security. Learn about passive adversaries, hardness assumptions, and proof techniques in the post-quantum setting.
Improved analysis of discrete Gaussian distributions for lattice-based cryptography, focusing on smoothness properties and subgaussian random variables to enhance security and efficiency.
Explore efficient zero-knowledge arguments for arithmetic circuits, their applications, and novel approaches to MPC-in-the-head protocols, with a focus on improving performance and reducing communication costs.
Explore a new paradigm for public-key functional encryption, focusing on degree-2 polynomials. Learn about filtering encrypted emails and advancements in cryptographic techniques.
Get personalized course recommendations, track subjects and courses with reminders, and more.