Courses from 1000+ universities
Coursera sees headcount decrease and faces lawsuit in 2023, invests in proprietary content while relying on Big 5 partners.
600 Free Google Certifications
Language Learning
Information Technology
Leadership
Competitive Strategy
Functional Programming Principles in Scala
Medical Parasitology | 医å¦å¯„生虫å¦
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore cryptography theories with TheIACR's online material, covering ring signatures, witness encryption, and secret keys. Estimated workload: 1-2 hours.
Dive into advanced encryption with TheIACR's online program. Learn about security, privacy, authenticity, and more in just 1-2 hours.
Dive into post-quantum and transparent recursive proofs with TheIACR's online material. Learn about SNARKS, recursion, holographic proofs, and more in under an hour.
Dive into Key-Homomorphic Pseudorandom Functions with this less than 1-hour material by TheIACR, exploring topics from Lattice-based PRFS to Learning with Rounding and Errors.
Dive into private aggregation with TheIACR's concise study of a Eurocrypt 2020 paper, exploring algorithms, uniform distribution, and variance in under an hour.
Explore Blind Schnorr Signatures and Signed ElGamal Encryption in the Algebraic Group Model with TheIACR. Less than an hour's study.
Explore the complexity of active security in cryptographic protocols with this under 1-hour material by TheIACR, featuring a paper presented at Eurocrypt 2020.
Explore scalability in public-key encryption with TheIACR's concise study, featuring multi-instance security, cryptographic schemes, and future directions. Less than 1hr workload.
Explore Fault Template Attacks on Block Ciphers with this under 1-hour material by TheIACR, featuring a paper presented at Eurocrypt 2020. Dive into FA countermeasures and experiments.
Dive into algebraic attacks on rank metric code-based cryptosystems with this under 1-hour material from TheIACR, featuring a comprehensive study presented at Eurocrypt 2020.
Dive into cryptography with TheIACR's concise study on the Retracing Boomerang Attack, exploring block ciphers, differential attacks, and AES rounds.
Explore statistical security in 2-party protocols, witness indistinguishability, and oblivious transfer in this under 1-hour material by TheIACR.
Dive into advanced cryptography with TheIACR's concise study on improved cube attacks, featuring a new algorithm, history of cube attacks, and a deep dive into three-subset division property.
Explore quantum security analysis of CSIDH with TheIACR's material, covering key exchange, cryptanalysis principles, and Kuperberg's algorithm. Less than 1hr workload.
Explore quantum complexities and merging strategies with TheIACR's material, including Wagner's algorithm and the Generalized Birthday Problem. Less than 1hr workload.
Get personalized course recommendations, track subjects and courses with reminders, and more.