billbuchanan / csn09112Links
CSN09112 Module
☆41Updated last week
Alternatives and similar repositories for csn09112
Users that are interested in csn09112 are comparing it to the libraries listed below
Sorting:
- MSc module in Applied Cryptography - CSN11131☆68Updated 4 months ago
- MSc Module☆59Updated 4 years ago
- PQC Transition Tools Index☆33Updated 5 months ago
- A curated list of resources about post-quantum cryptography.☆330Updated 2 weeks ago
- ☆146Updated 3 months ago
- Privacy Engineering Collaboration Space☆265Updated 2 weeks ago
- Interactive documentation on zero-knowledge proof systems and related primitives.☆161Updated 2 weeks ago
- ☆143Updated 4 months ago
- This is my personal (big) recopilation about cryptanalysis, crypto tools and challenges☆78Updated last year
- An awesome list of resources on deception-based security with honeypots and honeytokens☆175Updated 8 months ago
- Deployments of fancy cryptography☆153Updated last month
- Machine Learning for Cybersecurity Cookbook, published by Packt☆343Updated 2 years ago
- The TLS-Scanner Module from TLS-Attacker☆278Updated 3 weeks ago
- A repository that aims to provide tools for cryptography and cryptanalysis☆216Updated 5 years ago
- The BBS Signature Scheme☆89Updated last month
- Hands-On Network Forensics by Nipun Jaswal☆51Updated 2 years ago
- A simple virtual lab builder/player☆32Updated last week
- A list of the state of IETF protocols and PQC☆68Updated 2 months ago
- ☆36Updated 4 years ago
- Pure Rust implementation of (draft) FIPS 203 Module-Lattice-based Key-Encapsulation Mechanism Standard for server, desktop, browser and e…☆17Updated last year
- A repository for leveraging Self-Sovereign Identity in applications☆66Updated 2 years ago
- A collection of links, research papers, tools, researchers, events, ... every web3 follower should know.☆69Updated last year
- A Course in Cryptanalysis☆146Updated 10 months ago
- An ongoing list of virtual cybersecurity conferences.☆121Updated 4 years ago
- An AI-Powered Privacy Threat Modeling tool based on the LINDDUN framework by leveraging Large Language Models.☆22Updated last month
- Packet Captures☆386Updated 7 years ago
- Investigation Planner for long running analysis with unpredictable execution time. For example, dynamic analysis.☆16Updated 8 years ago
- A collection of articles, manuals, research papers, blogs, videos and software somehow related to the Public Key Cryptography (PKI).☆73Updated 8 months ago
- Awesome CSIRT is an curated list of links and resources in security and CSIRT daily activities.☆550Updated 3 weeks ago
- This is an open-source repository of cybersecurity curricular modules for K-12☆48Updated last year