Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Computer Science
Psychology
Algorithms and Data Structures
Stanford Introduction to Food and Health
Gamification
Learn to Program: The Fundamentals
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Discover how to implement hybrid post-quantum cryptography for secure email systems, focusing on PKI integration, S/MIME migration, and practical deployment across Microsoft Outlook and open-source platforms.
Explore key findings from large-scale testing of post-quantum cryptography deployment, examining protocol ossification challenges and practical solutions for successful implementation across servers.
Explore experimental findings on how post-quantum cryptography algorithms affect mutual TLS authentication performance, network latency, and data transfer speeds across various network conditions.
Explore the latest developments in post-quantum cryptography standardization at IETF, focusing on protocol integration challenges, new algorithms, and hybrid deployment strategies for Internet security.
Explore the Post-Quantum Cryptography Interoperability initiative, its testing tools, prototype OIDs, and compatibility matrix for implementing quantum-resistant algorithms in X.509 infrastructure.
Explore the implementation of hybrid quantum-safe digital signatures combining ML-DSA and ECDSA for securing self-sovereign identity systems against future quantum threats.
Discover practical insights into quantum-safe migration for banking applications, exploring performance impacts, deployment strategies, and real-world benchmarking results from financial sector implementations.
Explore strategies for designing PKI hierarchies that smoothly transition to post-quantum cryptography, covering algorithm selection, hybrid approaches, and X.509 migration mechanisms.
Explore the complexities of implementing quantum-safe secure boot, from algorithm selection to hybrid PQ/T requirements, signature verification, and key management challenges.
Explore challenges and progress in integrating post-quantum cryptography into Internet protocols, including PKI hybrid modes for enhanced security and migration flexibility.
Explore Canada's strategy for post-quantum cryptography transition, including guidance, international standards efforts, and key considerations for implementation.
Explore ETSI's work on quantum-safe cryptography standards, including current recommendations and specifications, and AWS's alignment with PQC migration efforts.
Explore quantum computing's impact on cryptography and NIST's efforts to develop quantum-resistant algorithms for future cybersecurity standards.
Explore migration strategies for post-quantum PKI authentication using mixed certificate chains, combining hash-based and lattice-based signature schemes.
Explore the impact of quantum computing on trust services and eIDAS regulation. Gain insights into proactive strategies for maintaining security in a quantum-affected landscape.
Get personalized course recommendations, track subjects and courses with reminders, and more.