Lecture notes for a course on cryptography
☆569Dec 11, 2023Updated 2 years ago
Alternatives and similar repositories for crypto
Users that are interested in crypto are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Book in preparation: introduction to theoretical computer science☆1,004Mar 18, 2024Updated 2 years ago
- High Speed elliptic curve signature system using a 260-bit Granger Moss Prime.☆14Jun 3, 2021Updated 4 years ago
- MIT 6.875☆14Dec 13, 2025Updated 3 months ago
- Tamarin proof for the KEMTLS protocol using the multi-stage AKE model☆13Apr 19, 2023Updated 2 years ago
- A tool for linear and differential cryptanalysis of block ciphers written in Rust☆15Sep 28, 2022Updated 3 years ago
- Small repo for implementing the 2018 EUROCRYPT paper "Simple Proofs of Sequential Work" by Cohen and Pietrzak. Also used as part of our C…☆10Aug 26, 2018Updated 7 years ago
- Differential fuzzing for elliptic curves☆24Sep 6, 2023Updated 2 years ago
- I-D that describes the algorithm identifiers for NIST's PQC ML-DSA for use in the Internet X.509 Public Key Infrastructure☆14Oct 30, 2025Updated 4 months ago
- CryptoBib Database for Developers☆45Updated this week
- LaTeX class for the IACR Transactions on Symmetric Cryptology☆36Aug 6, 2024Updated last year
- A lecture on quantum computing and symmetric-key cryptography at Chinese Academy of Sciences☆15Nov 19, 2020Updated 5 years ago
- Attacks on Jarvis and Friday☆10Oct 9, 2019Updated 6 years ago
- ☆15Sep 7, 2020Updated 5 years ago
- Lecture notes on the Foundations of Isogeny-based Cryptography☆33Sep 5, 2024Updated last year
- Please see https://github.com/hacspec/hax☆246Feb 12, 2024Updated 2 years ago
- Constant-time choose between two variables in Clang/LLVM☆20Apr 14, 2018Updated 7 years ago
- Basis Reduction Algorithms for Codes (LLL and more)☆28Feb 27, 2024Updated 2 years ago
- Writeups for past CTFs I've joined☆18Jun 1, 2021Updated 4 years ago
- Passive-Swoosh: Practical Lattice-Based Non-Interactive Key Exchange☆29Jun 7, 2024Updated last year
- Naehrig, Niederhagen and Schwabe's pairings code, massaged into a shared library.☆18Apr 19, 2016Updated 9 years ago
- Implementation and simulations for the "Reducing Metadata Leakage from Encrypted Data and Communication with PURBs" paper☆30Oct 26, 2023Updated 2 years ago
- Around applying the VDF construcrtion based on isogenies between super-signular elliptic curves☆14Oct 19, 2021Updated 4 years ago
- An implementation of ZKBoo☆33May 10, 2022Updated 3 years ago
- Zero-related bugs in 4 BLS libs & standard draft,"splitting zero" attacks, $35000 award☆17Aug 20, 2021Updated 4 years ago
- SIDH C reference implementation☆13Jan 25, 2017Updated 9 years ago
- Xoodyak, a lightweight and versatile cryptographic scheme implemented in Rust.☆30Apr 24, 2025Updated 10 months ago
- A curated list of cryptography papers, articles, tutorials and howtos.☆2,009Oct 17, 2024Updated last year
- Intuitive Quantum Computation and Post-Quantum Cryptography☆62Sep 21, 2022Updated 3 years ago
- A Rust implementation of CPace, a balanced PAKE.☆26Dec 15, 2023Updated 2 years ago
- ☆68Apr 13, 2020Updated 5 years ago
- Intuitive Advanced Cryptography☆436Aug 1, 2022Updated 3 years ago
- like ChaCha, but 64-bit instead of 32-bit thanks to BLAKE2b's permutation☆16Apr 8, 2017Updated 8 years ago
- Guidelines for low-level cryptography software☆1,200Jun 11, 2023Updated 2 years ago
- FrodoKEM: Learning with Errors Key Encapsulation. FrodoKEM is a family of key-encapsulation mechanisms that are designed to be conservati…☆160Sep 29, 2025Updated 5 months ago
- https://eprint.iacr.org/2020/1516.pdf☆19Jan 2, 2023Updated 3 years ago
- ☆21Dec 16, 2022Updated 3 years ago
- Lecture notes for Chris Peikert's graduate-level Theory of Cryptography course☆188Sep 15, 2025Updated 6 months ago
- ☆23Jan 21, 2019Updated 7 years ago
- Experimental implementation of KEMTLS in Rustls☆34Nov 11, 2025Updated 4 months ago