TomLous / coursera-cryptography1Links
Assignments for Coursera's Cryptography I course by Dan Boneh
☆123Updated 10 years ago
Alternatives and similar repositories for coursera-cryptography1
Users that are interested in coursera-cryptography1 are comparing it to the libraries listed below
Sorting:
- Coursera Stanford Cryptography 1☆75Updated 11 years ago
- ☆22Updated 6 years ago
- Cryptography-I is a 6-week course in Coursera By Stanford University☆12Updated 10 years ago
- A curated list of academic blockchain-related papers☆125Updated last month
- A defunct and ancient set of python bindings for Pairing Based Cryptography☆52Updated last year
- Cryptography course slides at Harbin Institute of Technology☆191Updated last year
- LaTeX package for typesetting pseudocode and cryptographic games☆176Updated last year
- ☆10Updated 5 years ago
- A C++ library containing both easy-to-use lower level bigint/ecgroup interfaces and high-level cryptographical schemes/protocols.☆78Updated 11 months ago
- Minimal examples to use libsnark.☆21Updated 4 years ago
- A Python package for Elliptic Curve Cryptography (ECC), supporting ElGamal, ECDH and ECDSA.☆46Updated last month
- ☆33Updated 5 years ago
- Scripts that illustrate basic cryptography concepts based on Coursera Standford Cryptography I course and more.☆66Updated 4 years ago
- 6.857 project - implementation of scheme for encrypting integer vectors that allows addition, linear transformation, and weighted inner p…☆69Updated 8 years ago
- Repository containing implementation of attacks on modern public key cryptosystems and symmetric key ciphers.☆134Updated last year
- 可编辑区块链,使用基于RSA假设及因数分解的陷门哈希函数替换以太坊geth客户端的keccak256算法并开放出JSON-RPC接口,实现单节点修改指定区块数据、多节点同步修改区块数据的功能。☆17Updated 4 years ago
- ☆62Updated 4 years ago
- Attribute-based Encryption☆201Updated 4 years ago
- Elgamal Encryption using Elliptic Curve Cryptography in Python 2.7☆12Updated 6 years ago
- OHIE - Blockchain scaling☆34Updated 4 years ago
- This is the implementation of the policy-based chameleon hash function with black-box accountability PCHBA. We use PCHBA to secure blockc…☆35Updated 3 years ago
- MIT 6.875☆14Updated last year
- Implementation of a toolkit for ring-LWE based cryptography in arbitrary cyclotomic number fields.☆38Updated 9 years ago
- Implementation of "Reading in the Dark: Classifying Encrypted Digits with Functional Encryption"☆21Updated last year
- AFGH Proxy Re-Encryption with RELIC (C library)☆11Updated 5 years ago
- Lattice RingCT v2.0 with Multiple Input and Output Wallets☆11Updated 6 years ago
- The compiler for ObliVM☆65Updated 4 years ago
- This is the repository to host the code for hslang parsing and code generation.☆20Updated 3 years ago
- ☆223Updated 4 months ago
- The Pairing-based Crypto library☆251Updated 2 weeks ago