ashumeow / cryptography-ILinks
Cryptography-I is a 6-week course in Coursera By Stanford University
☆12Updated 10 years ago
Alternatives and similar repositories for cryptography-I
Users that are interested in cryptography-I are comparing it to the libraries listed below
Sorting:
- Assignments for Coursera's Cryptography I course by Dan Boneh☆123Updated 10 years ago
- Coursera Stanford Cryptography 1☆75Updated 11 years ago
- A curated list of academic blockchain-related papers☆125Updated last month
- Cryptographic accumulator based on the strong RSA assumption, Python & Solidity☆77Updated 6 years ago
- A programming language and compiler which enable automatic compilation of intuitive data privacy specifications to NIZK-enabled private s…☆87Updated last year
- ZPiE: Zero-knowledge Proofs in Embedded systems☆25Updated last year
- ☆41Updated 2 years ago
- ☆223Updated 4 months ago
- Implementation of anonymous atomic locks described in https://eprint.iacr.org/2019/589☆25Updated 3 years ago
- LaTeX package for typesetting pseudocode and cryptographic games☆176Updated last year
- ☆20Updated 2 years ago
- ☆16Updated 4 years ago
- A C++ library containing both easy-to-use lower level bigint/ecgroup interfaces and high-level cryptographical schemes/protocols.☆78Updated 11 months ago
- ☆23Updated last year
- ☆11Updated 8 months ago
- Rust crypto library for data privacy tools☆110Updated last week
- Implementation of protocols for threshold signatures☆336Updated 5 months ago
- multi-authority attribute based encryption☆43Updated 4 years ago
- A curated list of awesome Zero-Knowledge Proofs (ZKP) resources.☆313Updated last month
- ☆62Updated 4 years ago
- Tutorial and example code for using libsnark☆193Updated 4 years ago
- Maintain a list of open source libraries of cryptographic excellence☆62Updated 2 years ago
- A Platform for Robust Threshold Cryptography based on Asynchronous Publicly Verifiable Secret Sharing with Tunable Security☆96Updated 2 years ago
- Dan Boneh 教授的Cryptography I,笔记自学自用☆20Updated 3 years ago
- Source code for the ICDCS 2022 paper "Dissecting the Performance of Chained-BFT"☆52Updated 2 years ago
- Pairing-based cryptography for Go☆101Updated 6 years ago
- A pure-Rust implementation of Bulletproofs using Ristretto.☆61Updated 11 months ago
- Zero-Knowledge Proof Toolbox☆34Updated 3 years ago
- A curated list of privacy on blockchains resources☆270Updated last year
- Non-interactive protocol for secure transformer inference based on RNS-CKKS.☆111Updated 9 months ago