Stanford Cryptography class excercises
☆20May 13, 2012Updated 13 years ago
Alternatives and similar repositories for crypto-class
Users that are interested in crypto-class are comparing it to the libraries listed below
Sorting:
- ctf writeups☆19Sep 4, 2018Updated 7 years ago
- This is a toy implementation in Go of Manger's chosen-ciphertext attack on RSA-OAEP☆31Apr 5, 2018Updated 7 years ago
- This Projects has implemented three asymmetric and homomorphic encryption BGN, Benaloh, Paillier in Java using JPBC library.☆10Dec 27, 2019Updated 6 years ago
- 🏴 Collection of CTF solutions☆74Apr 7, 2019Updated 6 years ago
- A White-Box Masking Scheme Against Computational and Algebraic Attacks☆13Jan 6, 2021Updated 5 years ago
- Sage implementation of the MAYO scheme☆15Feb 3, 2025Updated last year
- ☆10Apr 10, 2020Updated 5 years ago
- Perl wrapper for the capstone library☆13Mar 7, 2017Updated 8 years ago
- 8 labs of course Introduction to Computer System☆10Jun 17, 2014Updated 11 years ago
- Subclass of UIActivityIndicatorView allowing you to set your own image.☆22Aug 15, 2013Updated 12 years ago
- C++ STL for speed and cryptanalytic application☆11Dec 16, 2025Updated 2 months ago
- Redirects all outgoing pod traffic via a single static egress IP☆13Apr 12, 2019Updated 6 years ago
- Framework Free: Functionally Rendered HTML and State Management in Vanilla JS☆12May 4, 2024Updated last year
- Python library for vectorial Boolean functions in cryptography☆11Nov 15, 2023Updated 2 years ago
- ☆10Apr 8, 2018Updated 7 years ago
- Wouter Castryck, Thomas Decru. "An efficient key recovery attack on SIDH" の実装☆11Aug 12, 2023Updated 2 years ago
- Help me analyze bandaged Rubik's cubes.☆12Nov 30, 2020Updated 5 years ago
- React Native Workshop for HackConf 2019☆10Jan 31, 2022Updated 4 years ago
- Record some of my tools, not limited to language☆12Jan 3, 2016Updated 10 years ago
- A purely academic effort to compile a subset of C to a 3-symbol, 5-tape simulated turing machine ruleset.☆11Sep 17, 2011Updated 14 years ago
- Improved Search for Integral, Impossible Differential and Zero-Correlation Attacks: Application to Ascon, ForkSKINNY, SKINNY, MANTIS, PRE…☆14Jul 30, 2025Updated 7 months ago
- The SPARX family of lightweight block ciphers☆11Jun 29, 2018Updated 7 years ago
- GLPK, but it's Python.☆14Sep 3, 2024Updated last year
- End-to-End Gradient Inversion (Gradient Leakage in Federated Learning) 【https://ieeexplore.ieee.org/document/9878027】☆11Aug 19, 2022Updated 3 years ago
- The vOW4SIKE project provides C code that implements the parallel collision search algorithm by van Oorschot and Wiener (vOW). The algori…☆12May 25, 2021Updated 4 years ago
- Type safe patters for analytics☆11Mar 23, 2021Updated 4 years ago
- Workshop content for our first MCP workshop☆14Mar 20, 2025Updated 11 months ago
- Cozely: a simple framework for making games in Go☆13Mar 5, 2019Updated 6 years ago
- Vite with Tanstack React Router B2B Saas SPA demo☆13Mar 18, 2025Updated 11 months ago
- Implements Coron's simplification of Coppersmith's algorithm☆10May 28, 2017Updated 8 years ago
- A sample application for running Keystone 6 on Azure☆10Dec 20, 2021Updated 4 years ago
- This is a sample project for getting started with Unity and data visualization.☆11Jun 5, 2020Updated 5 years ago
- ☆11Nov 10, 2015Updated 10 years ago
- Cryptanalysis of the Legendre PRF Challenges☆11Nov 27, 2019Updated 6 years ago
- Collection of algorithms and data structures optimized for competitive programming☆10Mar 24, 2025Updated 11 months ago
- Attacks on Jarvis and Friday☆10Oct 9, 2019Updated 6 years ago
- Generate fixed dimensional embeddings for multi-dimensional vectors in python based on Muvera from Google.☆20Jun 28, 2025Updated 8 months ago
- Deep Dream Machine iOS☆11Jul 12, 2015Updated 10 years ago
- Implementation 2-3 heap on C++☆11Dec 16, 2014Updated 11 years ago