Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Marketing
Cybersecurity
Machine Learning
Circuits and Electronics 1: Basic Circuit Analysis
Academic Writing Made Easy
Nutrition, Exercise and Sports
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore statistical distance in security games, focusing on Hellinger distance as an alternative to max-log for bit security frameworks and leftover hash lemma applications.
Innovative hashing technique using three compression calls for five inputs, offering improved efficiency and security for Merkle-Damgård hashing and Merkle trees with potential applications in cryptography.
Explore novel fuzzy extractor construction using error-correcting codes and cryptographic groups, supporting MIPURS distributions for enhanced biometric authentication security.
Explore line-point zero knowledge proofs, their efficiency in arithmetic circuit satisfiability, and applications in non-interactive secure computation and vector oblivious linear evaluation.
Explore P4-free partition and cover numbers in graph theory, their applications in cryptography, and connections to communication complexity and randomness extraction.
Explores doubly-affine extractors for efficient information-theoretic encryption, proposing solutions with large keys and a novel architecture for outsourcing key storage to semi-trusted servers.
Explores security of Proofs of Sequential Work in post-quantum settings, analyzing constructions, research questions, and formal proofs for cryptographic applications.
Explore the relationship between private-coin and public-coin interactive proofs, focusing on efficiency-preserving transformations and their implications for cryptographic assumptions and protocol design.
Explore quantum-access security of Winternitz one-time signatures, analyzing hash chains in the quantum random oracle model and discussing blind-unforgeability for enhanced post-quantum cryptographic security.
Explores impossibility results for generic-group identity-based encryption, presenting a tight threshold and discussing implications for algebraic constructions in cryptography.
Explore randomness complexity in interactive and statistical zero-knowledge proofs, focusing on reducing verifier's random bits and achieving tradeoffs in SZK protocols.
Physics-based planning for robotic object manipulation in cluttered scenes and collaborative human-robot tasks. Explores motion prediction, force stability, and human comfort constraints for advanced manipulation scenarios.
Exploring cheetah-inspired aerodynamic robot tails and state estimation for hybrid systems, enhancing agility in legged robots and improving control during discontinuous impacts.
Explore recent advances and challenges in quantum internet technology, including architecture, resource allocation, and performance evaluation of quantum switches, with insights on future research directions.
Explore semantic robot programming, its potential to revolutionize human-robot interaction, and the challenges in making robotics accessible to diverse users and developers.
Get personalized course recommendations, track subjects and courses with reminders, and more.