ashumeow / cryptography-I
Cryptography-I is a 6-week course in Coursera By Stanford University
☆10Updated 9 years ago
Related projects: ⓘ
- Assignments for Coursera's Cryptography I course by Dan Boneh☆119Updated 9 years ago
- LaTeX package for typesetting pseudocode and cryptographic games☆151Updated 9 months ago
- The Pairing-based Crypto library☆231Updated 6 months ago
- MIRACL Core☆205Updated 2 months ago
- Coursera Stanford Cryptography 1☆73Updated 10 years ago
- ☆199Updated last month
- Example to create merkle path proof using libsnark☆45Updated 4 years ago
- ☆8Updated 2 years ago
- CryptoBib BibTex files☆50Updated last week
- A C++ library containing both easy-to-use lower level bigint/ecgroup interfaces and high-level cryptographical schemes/protocols.☆73Updated 2 months ago
- A Platform for Robust Threshold Cryptography based on Asynchronous Publicly Verifiable Secret Sharing with Tunable Security☆95Updated 2 years ago
- Vector OLE and zero-knowledge for Z2k. https://ia.cr/2022/819☆15Updated last year
- Tutorial and example code for using libsnark☆188Updated 3 years ago
- ☆23Updated 5 years ago
- Comprehensive Open Source Library for Secure Multiparty Computation☆179Updated last year
- Cryptography course slides at Harbin Institute of Technology☆174Updated 4 months ago
- Cryptographic accumulator based on the strong RSA assumption, Python & Solidity☆71Updated 5 years ago
- ☆177Updated 3 years ago
- Example implementation of the SealPIR protocol☆137Updated last year
- Go version of the Pedersen commitment scheme☆13Updated 4 years ago
- ☆32Updated 3 years ago
- Privacy-Enhancing Technologies via Applied Cryptography Engineering☆26Updated last week
- Library for performing Function Secret Sharing (FSS)☆82Updated 5 years ago
- (Towards) Scalable Threshold Crypto: BLS threshold signatures with millions of signers and a scalable Distributed Key Generation (and VSS…☆32Updated 7 months ago
- C++ library for Finite Fields and Elliptic Curves☆153Updated 2 years ago
- ☆17Updated 4 months ago
- Repository for the SCALE-MAMBA MPC system☆245Updated last year
- Statistically Acceptable GAussian☆11Updated last year
- Implementation of a toolkit for ring-LWE based cryptography in arbitrary cyclotomic number fields.☆35Updated 8 years ago
- The Scyther Tool for the symbolic analysis of security protocols☆96Updated 4 months ago