Assignments for Coursera's Cryptography I course by Dan Boneh
☆129May 20, 2015Updated 10 years ago
Alternatives and similar repositories for coursera-cryptography1
Users that are interested in coursera-cryptography1 are comparing it to the libraries listed below
Sorting:
- Coursera Stanford Cryptography 1☆75May 27, 2014Updated 11 years ago
- resources for mini lctf 2020☆24Feb 20, 2026Updated 2 weeks ago
- Practical Cryptoanalysis☆12Nov 23, 2015Updated 10 years ago
- A simple trip planner application made in React.☆10Jan 5, 2023Updated 3 years ago
- Fast Expert Witness Compression Format (EWF) hash calculator☆15Sep 15, 2021Updated 4 years ago
- Data structures & algorithms implemented in Java and solutions to leetcode problems.☆16Mar 18, 2024Updated last year
- ☆13Oct 26, 2025Updated 4 months ago
- A hybrid Java/Python desktop app that collects regional Uber/Lyft driver information in real-time☆10Sep 16, 2017Updated 8 years ago
- ☆102Mar 17, 2025Updated 11 months ago
- ☆39Sep 6, 2023Updated 2 years ago
- Liferay elasticsearch integration☆12Jan 3, 2018Updated 8 years ago
- Gandr is a cross-platform bootloader project, intended to fill in the gap of a utopic bootloader.☆20Aug 13, 2015Updated 10 years ago
- Old Persona 3/4 Text editor☆10May 21, 2019Updated 6 years ago
- Electrum Server for Verge☆10May 7, 2018Updated 7 years ago
- A first bare bones paralleled implementation of Go Explore as described by the Uber Engineering blog post☆46Jan 25, 2019Updated 7 years ago
- PSO2es Fan translation Patch tool☆12Dec 8, 2022Updated 3 years ago
- ☆11Mar 8, 2025Updated last year
- ☆10Jan 3, 2020Updated 6 years ago
- A collection of amazing Jupyter Notebooks with insightful projects/ideas under various domains of Data Science and Machine Learning.☆10Oct 31, 2020Updated 5 years ago
- Mirror for Java and PHP libraries and text resources to facilitate the use of Inuktitut in its written form on computers and the web☆10Aug 2, 2015Updated 10 years ago
- Homotopy type theory☆14Sep 21, 2022Updated 3 years ago
- A lightweight packet capture application☆12Oct 16, 2014Updated 11 years ago
- 🏆 A decentralized layer to support NFT on Mixin Messenger and Kernel.☆17Feb 19, 2026Updated 2 weeks ago
- Modern PCL (Printer Command Language) Viewer☆11Aug 11, 2016Updated 9 years ago
- A collection of .bashrc stuff and other dotfiles☆20Feb 19, 2026Updated 2 weeks ago
- introduction to dataflow analysis using julia☆14Oct 26, 2020Updated 5 years ago
- Overriding the scaling algorithm to smooth out the unfiltered textures☆13Aug 25, 2021Updated 4 years ago
- Computer Security Class - Department of Informatics and Telecommunications, University of Athens☆12Feb 22, 2017Updated 9 years ago
- Implementation of our NeurIPS 2019 paper: Subspace Attack: Exploiting Promising Subspaces for Query-Efficient Black-box Attacks☆10Dec 16, 2019Updated 6 years ago
- Sensor-Fusion-and-Object-Tracking-2☆10Mar 3, 2021Updated 5 years ago
- Rust interface to the Tor Control Protocol (TorCP)☆13Nov 1, 2021Updated 4 years ago
- ☆10Oct 28, 2022Updated 3 years ago
- Computation using data flow graphs for scalable machine learning☆10Mar 15, 2018Updated 7 years ago
- Jupytext talk at PyParis 2018☆11Dec 10, 2018Updated 7 years ago
- R2/L2 trigger remap plugin and configuration application☆12Jul 19, 2020Updated 5 years ago
- IPv4/UDP stack written in VHDL code, for interfacing with an FPGA over Ethernet☆11Jun 2, 2021Updated 4 years ago
- Example Python code using FEniCS and dolfin.adjoint to accompany SMO paper on topology optimisation for heat sinks with embedded PCM.☆10Aug 22, 2023Updated 2 years ago
- php websocket private chat☆10Mar 29, 2018Updated 7 years ago
- Locking and concurrency in Linux kernel examples☆14Nov 18, 2022Updated 3 years ago