Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Computer Science
Psychology
Microsoft Excel
Lean Production
Viruses & How to Beat Them: Cells, Immunity, Vaccines
Learn Like a Pro: Science-Based Tools to Become Better at Anything
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore NIST's progress in quantum-resistant cryptography standardization, including insights on migration practices and upcoming signature scheme evaluations.
Explore post-quantum signature algorithms' impact on WebPKI, current solutions, and future proposals for maintaining web security in the quantum era.
Explore post-quantum cryptography, focusing on code-based systems, their design principles, security, and challenges in NIST's standardization process.
Explore ANSSI's three-step roadmap for transitioning to quantum-safe cryptography, addressing the quantum computing threat while ensuring security.
Explore the Dutch government's quantum-resilient cryptography strategy, including concrete steps and advice for organizations to mitigate quantum technology risks.
Explore findings on Post-Quantum Cryptography's impact on telecom networks. Gain insights into quantum risk management and best practices for Telco use cases, focusing on PKI implications.
Explore the US governance and regulatory framework for Post-Quantum Cryptography, focusing on HR 7535 and collaborative efforts to prepare for quantum computing's impact on cybersecurity.
Explore machine-checking techniques for post-quantum cryptography, addressing challenges and ongoing projects in EasyCrypt and Jasmine within the Formosa Crypto consortium.
Leverage zero trust journey to make a compelling case for post-quantum cryptography. Learn strategies to align PQC with organizational goals and execute a successful transition.
Establish a Post-Quantum Crypto test environment to evaluate ecosystem options and address key challenges in PKI, Code Signing, IoT, and TLS use cases.
Explore lattice-based cryptography principles, including public key encryption and digital signatures, as applied in new PQC standards like Kyber, Dilithium, and Falcon.
Explore the challenges and timelines of transitioning authentication systems to quantum-secure methods, focusing on FIDO2 as an example for large-scale migrations.
Explore stateful hash-based signatures, their security benefits, and challenges in state handling for post-quantum cryptography transition.
Explore quantum-safe cryptography integration in enterprise applications, focusing on TLS for secure communication and hash-based signatures for software package signing.
Explore post-quantum algorithms' security, sizes, and speeds compared to classic ones. Benchmark Hardware Security Modules for real-world performance insights.
Get personalized course recommendations, track subjects and courses with reminders, and more.