billbuchanan / esecurityLinks
MSc Module
☆59Updated 5 years ago
Alternatives and similar repositories for esecurity
Users that are interested in esecurity are comparing it to the libraries listed below
Sorting:
- MSc module in Applied Cryptography - CSN11131☆72Updated this week
- Elliptic Curve Cryptography and Common Public Key Cryptography Implementations☆107Updated 10 months ago
- A curated list of resources about post-quantum cryptography.☆357Updated 5 months ago
- A python implementation of the signature scheme Falcon☆190Updated 3 weeks ago
- Sandwich is a multi-platform, multi-language, open-source library that provides a simple unified API for developers to use (multiple) cry…☆118Updated 8 months ago
- ☆36Updated 4 years ago
- Deployments of fancy cryptography☆171Updated this week
- CSN09112 Module☆41Updated last week
- This is my personal (big) recopilation about cryptanalysis, crypto tools and challenges☆79Updated 2 years ago
- A repository that aims to provide tools for cryptography and cryptanalysis☆218Updated 5 years ago
- NIST FIPS 203 (ML-KEM) standard compliant, C++20, fully `constexpr`, header-only library☆121Updated last month
- A cheat sheet for the new post quantum cryptography algorithms☆24Updated 8 months ago
- ☆145Updated 9 months ago
- JHU Advanced Topics in Applied Cryptography (601.745)☆53Updated 7 years ago
- FBPCP (Facebook Private Computation Platform) is a secure, privacy safe and scalable architecture to deploy MPC (Multi Party Computation)…☆101Updated last year
- A pure python implementation of ML-DSA (FIPS 204) and CRYSTALS-Dilithium☆120Updated last month
- FrodoKEM: Learning with Errors Key Encapsulation. FrodoKEM is a family of key-encapsulation mechanisms that are designed to be conservati…☆158Updated 4 months ago
- Falcon: Fast-Fourier Lattice-based Compact Signatures over NTRU - NIST PQC Digital Signature Algorithm☆33Updated 6 months ago
- We are a community of researchers and developers interested in advancing homomorphic encryption and other secure computation techniques.☆65Updated this week
- ☆54Updated 3 months ago
- PQC Transition Tools Index☆35Updated 2 weeks ago
- Who and what to follow in the world of cyber security☆151Updated 5 years ago
- Fork of BoringSSL that includes prototype quantum-resistant key exchange and authentication in the TLS handshake based on liboqs☆44Updated 2 weeks ago
- "One must acknowledge with cryptography no amount of violence will ever solve a math problem." ― Jacob Appelbaum☆73Updated 6 years ago
- Lecture notes for Chris Peikert's graduate-level Theory of Cryptography course☆187Updated 4 months ago
- Zeek Log Cheatsheets☆302Updated 5 months ago
- Hands-On Network Forensics by Nipun Jaswal☆62Updated 2 years ago
- Repository for the XMSS reference code, accompanying RFC 8391, XMSS: eXtended Merkle Signature Scheme☆57Updated 2 years ago
- (Still exploring) My cryptography journey: A collection of notebooks covering different algorithms and concepts from cryptography☆250Updated 2 years ago
- A curated list of amazing tools, products, tutorials, applications, publications, and other resources related to OpenFHE☆38Updated 3 weeks ago