boazbk / cryptoLinks
Lecture notes for a course on cryptography
☆542Updated last year
Alternatives and similar repositories for crypto
Users that are interested in crypto are comparing it to the libraries listed below
Sorting:
- Intuitive Advanced Cryptography☆436Updated 3 years ago
- Guidelines for low-level cryptography software☆1,170Updated 2 years ago
- A collection of common (interesting) cryptographic mistakes and learning resources.☆356Updated 2 months ago
- JHU Advanced Topics in Applied Cryptography (601.745)☆53Updated 7 years ago
- Cingulata (pronounced "tchingulata") is a compiler toolchain and RTE for running C++ programs over encrypted data by means of fully homom…☆407Updated 3 months ago
- ☆143Updated 4 months ago
- A party game for nerdy cryptographers. Shamelessly based on Cards Against Humanity.☆322Updated 5 years ago
- Book in preparation: introduction to theoretical computer science☆978Updated last year
- Bulletproofs are short non-interactive zero-knowledge proofs that require no trusted setup☆544Updated 2 years ago
- Constant-Time Toolkit☆298Updated 7 years ago
- Lecture notes for Chris Peikert's graduate-level Theory of Cryptography course☆177Updated last year
- The papers and books I've read or am about to read.☆1,150Updated 5 years ago
- A repository that aims to provide tools for cryptography and cryptanalysis☆214Updated 5 years ago
- ☆447Updated last year
- A place for useful crypto-related resources plus some of my fav stuff☆219Updated 4 years ago
- SIDH Library is a fast and portable software library that implements state-of-the-art supersingular isogeny cryptographic schemes. The ch…☆326Updated 2 years ago
- MIT 6.875☆14Updated this week
- Λ ⚬ λ: Functional Lattice Cryptography☆231Updated 4 years ago
- Cryptol: The Language of Cryptography☆1,175Updated last week
- Ledger's Advanced Side-Channel Analysis Repository☆397Updated 2 years ago
- Jupyter notebook for explaining elliptic curve encryption☆88Updated 4 years ago
- Python code to implement various number theory, elliptic curve and finite field computations.☆101Updated 3 years ago
- Main source code repository of the Tamarin prover for security protocol verification.☆474Updated last week
- EasyCrypt: Computer-Aided Cryptographic Proofs☆364Updated this week
- List of crypto projects that might not suck☆422Updated 2 years ago
- problem sets for CS-GY 6903 Applied Cryptography☆41Updated 3 years ago
- Reference implementation of the Picnic post-quantum signature scheme☆165Updated 2 years ago
- Scripts that illustrate basic cryptography concepts based on Coursera Standford Cryptography I course and more.☆68Updated 5 years ago
- Intuitive Quantum Computation and Post-Quantum Cryptography☆63Updated 3 years ago
- A python library that implements a number of Privacy Enhancing Technolgies☆135Updated 2 years ago