anishLearnsToCode / cryptography-and-information-theoryLinks
Coursera Course on Cryptography and Information Theory part of larger Applied Cryptography π Specialization by Univrsity of Colorado π on Coursera.
β17Updated 5 years ago
Alternatives and similar repositories for cryptography-and-information-theory
Users that are interested in cryptography-and-information-theory are comparing it to the libraries listed below
Sorting:
- Coursera Course Symmetric Cryptography π part of Introduction to Applied Cryptography Specialization.β17Updated 5 years ago
- the open source way to do the excercises to be a Full-Stack Cybersecurity Engineer. added with the recent paper in the field of Machine β¦β50Updated 4 years ago
- "One must acknowledge with cryptography no amount of violence will ever solve a math problem." β Jacob Appelbaumβ72Updated 6 years ago
- A curated list of awesome blockchain security resourcesβ27Updated 2 years ago
- Solutions and discussions from the Software Security course on Coursera. Open for collaboration and knowledge sharing.β42Updated 4 months ago
- a Python client to query the FIRST EPSS APIβ11Updated 2 years ago
- CSN09112 Moduleβ41Updated last week
- Write up for the CyberTalents 2017 qualifications roundβ12Updated 8 years ago
- A miscellany of thoughts.β47Updated last year
- FAANG (MANGA) Security Engineer Interview Collection. An ongoing & curated collection of awesome software, frameworks and libraries, learβ¦β86Updated 3 years ago
- A self-contained example Ethereum challenge using Paradigm's CTF frameworkβ31Updated 3 years ago
- Blockchain Security Tools and Techniques - A Deep Dive to Virtual Machines, Vulnerability Assessments, Penetration Testing, Audit Tools eβ¦β32Updated last year
- A collection of awesome software, libraries, documents, books, resources and cool stuff about cryptography in Cybersecurity.β23Updated 7 months ago
- Awesome list of AI for cybersecurity including network (network traffic analysis and intrusion detection), endpoint (anti-malware), appliβ¦β237Updated 2 years ago
- Open-source antivirus project.β31Updated 9 years ago
- β26Updated last year
- Tracing the evolution of AI and large language models from early neural networks to GPT-4 and beyond.β10Updated last week
- β26Updated 2 years ago
- Steganography app for Androidβ40Updated 4 years ago
- A centralized collection of study materials, assignments, slides, and resources for my M.Tech Software Engineering program at BITS Pilaniβ¦β36Updated last year
- The purpose of this document is to gather public information on vulnerabilities introduced on Blockchains software.β14Updated 6 years ago
- A curated awesome list of lists of interview questions. Feel free to contribute!β18Updated last year
- This post will provide you with all Linkedin Assessment Quiz Answers for free. The LinkedIn Skill Assessment feature allows you to demonsβ¦β69Updated 3 years ago
- π»π³ [VNCERT/CC] Digital Forensics Lab π»π³β21Updated last year
- This repository provides examples of Vulnerable and Mitigated code as per CWE Categorization.β23Updated last year
- Real Android malware apps discussed in the bookβ44Updated 2 years ago
- This repository contains public security audit reports conducted by CyStackβ17Updated last year
- Machine Learning For Cybersecurity.β69Updated 6 years ago
- The OWASP Vulnerable Web Applications Directory Project (VWAD) is a comprehensive and well maintained registry of all known vulnerable weβ¦β69Updated last week
- Learning material for completely newcomers in the field of BOFsβ14Updated 5 years ago