ashumeow / cryptography-I
Cryptography-I is a 6-week course in Coursera By Stanford University
☆12Updated 9 years ago
Alternatives and similar repositories for cryptography-I:
Users that are interested in cryptography-I are comparing it to the libraries listed below
- Assignments for Coursera's Cryptography I course by Dan Boneh☆120Updated 9 years ago
- Coursera Stanford Cryptography 1☆75Updated 10 years ago
- ☆18Updated 2 years ago
- LaTeX package for typesetting pseudocode and cryptographic games☆158Updated last year
- Statistically Acceptable GAussian☆11Updated last year
- MIT 6.875☆13Updated last year
- A C++ library containing both easy-to-use lower level bigint/ecgroup interfaces and high-level cryptographical schemes/protocols.☆76Updated 6 months ago
- A cross-chain framework for fabric based on relay chain tech. The current version of fabric is 1.4.4. 基于fabric的联盟链跨链框架☆12Updated 2 years ago
- Awesome list for cryptographic secure computation paper. This repo includes *Lattice*, *DifferentialPrivacy*, *MPC* and also a comprehens…☆207Updated last month
- Vector OLE and zero-knowledge for Z2k. https://ia.cr/2022/819☆16Updated last year
- ☆62Updated 4 years ago
- ☆36Updated 2 years ago
- Zero-Knowledge Proof Toolbox☆33Updated 3 years ago
- Libra zero knowledge proof system☆48Updated last year
- Go, C++, and C implementation of a bilinear group and pairing-based cryptography for both embedded and non-embedded systems☆36Updated 2 years ago
- A page containing many useful links.☆25Updated 4 months ago
- Threshold Cryptography Golang Library☆17Updated 2 years ago
- Lattices in Cryptography (University of Michigan)☆75Updated 4 months ago
- CryptoBib BibTex files☆55Updated 3 weeks ago
- a C++ library for Pretty Good Confidential Transaction System☆16Updated 2 years ago
- A SageMath implementation of the Castryck-Decru Key Recovery attack on SIDH☆124Updated last year
- ☆21Updated 5 months ago
- Private set intersection using garbled bloom filters in semi-honest setting☆24Updated 9 years ago
- ☆21Updated 6 years ago
- ☆10Updated 3 months ago
- (Towards) Scalable Threshold Crypto: BLS threshold signatures with millions of signers and a scalable Distributed Key Generation (and VSS…☆31Updated 11 months ago
- A Platform for Robust Threshold Cryptography based on Asynchronous Publicly Verifiable Secret Sharing with Tunable Security☆95Updated 2 years ago
- Example to create merkle path proof using libsnark☆45Updated 4 years ago
- SGX从入门到放弃☆347Updated 2 years ago
- ☆24Updated 2 years ago