Stanford Cryptography class excercises
☆20May 13, 2012Updated 13 years ago
Alternatives and similar repositories for crypto-class
Users that are interested in crypto-class are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ctf writeups☆19Sep 4, 2018Updated 7 years ago
- This is a sample project for getting started with Unity and data visualization.☆11Jun 5, 2020Updated 5 years ago
- This is a toy implementation in Go of Manger's chosen-ciphertext attack on RSA-OAEP☆31Apr 5, 2018Updated 7 years ago
- Perl wrapper for the capstone library☆13Mar 7, 2017Updated 9 years ago
- Mobile application for road surface quality measurement☆16Jul 19, 2017Updated 8 years ago
- Deep Dream Machine iOS☆11Jul 12, 2015Updated 10 years ago
- Source code for cmake-practice.pdf☆11Jun 11, 2014Updated 11 years ago
- Subclass of UIActivityIndicatorView allowing you to set your own image.☆21Aug 15, 2013Updated 12 years ago
- This Projects has implemented three asymmetric and homomorphic encryption BGN, Benaloh, Paillier in Java using JPBC library.☆10Dec 27, 2019Updated 6 years ago
- 🏴 Collection of CTF solutions☆74Apr 7, 2019Updated 6 years ago
- CPU Adventure 2 challenge from the Dragon CTF 2019☆16May 22, 2025Updated 10 months ago
- an encrypting archive tool using tar, gpg and perl☆14Dec 20, 2019Updated 6 years ago
- Small Jekyll template to present an iPhone app with a static site☆24Sep 1, 2014Updated 11 years ago
- Get up with speed, building and testing starknet cairo smart contracts with this list of written and tested smart contracts.☆17Dec 30, 2024Updated last year
- A purely academic effort to compile a subset of C to a 3-symbol, 5-tape simulated turing machine ruleset.☆11Sep 17, 2011Updated 14 years ago
- End-to-End Gradient Inversion (Gradient Leakage in Federated Learning) 【https://ieeexplore.ieee.org/document/9878027】☆11Aug 19, 2022Updated 3 years ago
- Record some of my tools, not limited to language☆12Jan 3, 2016Updated 10 years ago
- The OPE lib extracted from CryptoDb☆17Jun 3, 2016Updated 9 years ago
- ☆16Jun 13, 2025Updated 9 months ago
- Capstone bindings for Haskell: https://github.com/aquynh/capstone☆15Apr 5, 2021Updated 4 years ago
- Python 2/3 driver for Sparkfun mpu9250 IMU☆21Nov 1, 2019Updated 6 years ago
- A White-Box Masking Scheme Against Computational and Algebraic Attacks☆13Jan 6, 2021Updated 5 years ago
- Implementation of a Threshold Paillier Cryptosystem distributed key generation protocol☆12Sep 15, 2025Updated 6 months ago
- Paillier Homomorphic Addition Public Key Cryptosystem☆18Dec 5, 2020Updated 5 years ago
- Somewhat homomorphic encryption over elliptic curve using BGN cryptosystem☆12May 7, 2022Updated 3 years ago
- Some RSA attacks with sage☆11Nov 15, 2016Updated 9 years ago
- Training material for the Shellcode-Lab, including Slides and Codes☆20Jun 13, 2019Updated 6 years ago
- Attacks on Jarvis and Friday☆10Oct 9, 2019Updated 6 years ago
- Python library for vectorial Boolean functions in cryptography☆11Nov 15, 2023Updated 2 years ago
- C++ STL for speed and cryptanalytic application☆11Dec 16, 2025Updated 3 months ago
- ☆14Jun 25, 2019Updated 6 years ago
- A C++ implementation of the TinyLEGO cryptographic protocol [NST17] for general secure two-party computation☆16Jun 4, 2017Updated 8 years ago
- Implementation of Privacy-Preserving Deep Learning via Additively Homomorphic Encryption (Using LWE schema)☆14Aug 16, 2018Updated 7 years ago
- The SPARX family of lightweight block ciphers☆11Jun 29, 2018Updated 7 years ago
- Wouter Castryck, Thomas Decru. "An efficient key recovery attack on SIDH" の実装☆11Aug 12, 2023Updated 2 years ago
- ☆20Dec 12, 2015Updated 10 years ago
- ☆10Apr 8, 2018Updated 7 years ago
- Wireshark Post-Descriptors written in LUA☆13Apr 2, 2020Updated 5 years ago
- A set of scripts for a radare-based malware code analysis workflow☆68Jan 10, 2019Updated 7 years ago