boazbk / crypto
Lecture notes for a course on cryptography
☆511Updated 10 months ago
Related projects ⓘ
Alternatives and complementary repositories for crypto
- Intuitive Advanced Cryptography☆430Updated 2 years ago
- A collection of common (interesting) cryptographic mistakes and learning resources.☆318Updated 2 months ago
- Guidelines for low-level cryptography software☆1,106Updated last year
- Constant-Time Toolkit☆294Updated 6 years ago
- Bulletproofs are short non-interactive zero-knowledge proofs that require no trusted setup☆535Updated last year
- Cingulata (pronounced "tchingulata") is a compiler toolchain and RTE for running C++ programs over encrypted data by means of fully homom…☆404Updated 9 months ago
- Λ ⚬ λ: Functional Lattice Cryptography☆224Updated 3 years ago
- A curated list of cryptography papers, articles, tutorials and howtos.☆1,795Updated 3 weeks ago
- JHU Advanced Topics in Applied Cryptography (601.745)☆51Updated 6 years ago
- A party game for nerdy cryptographers. Shamelessly based on Cards Against Humanity.☆320Updated 4 years ago
- Crypto Audit Guidelines☆132Updated 3 years ago
- Main source code repository of the Tamarin prover for security protocol verification.☆418Updated last week
- ☆133Updated 2 years ago
- A place for useful crypto-related resources plus some of my fav stuff☆219Updated 3 years ago
- Cryptol: The Language of Cryptography☆1,139Updated last week
- Ledger's Advanced Side-Channel Analysis Repository☆376Updated last year
- problem sets for CS-GY 6903 Applied Cryptography☆39Updated 2 years ago
- Deployments of fancy cryptography☆124Updated last week
- A curated list of resources about post-quantum cryptography☆249Updated last month
- A repository that aims to provide tools for cryptography and cryptanalysis☆201Updated 4 years ago
- Flexible and Constant Time Programming Language☆198Updated 2 years ago
- a protocol to encrypt communications and a cryptographic library based on Disco☆203Updated 3 years ago
- The Illustrated TLS 1.3 Connection: Every byte explained☆820Updated 2 months ago
- Lecture notes for Chris Peikert's graduate-level Theory of Cryptography course☆160Updated 10 months ago
- Jupyter notebook for explaining elliptic curve encryption☆86Updated 3 years ago
- NuCypher fully homomorphic encryption (NuFHE) library implemented in Python☆444Updated 2 years ago
- Intuitive Quantum Computation and Post-Quantum Cryptography☆62Updated 2 years ago
- Decentralize your secrets!☆117Updated 5 years ago
- List of crypto projects that might not suck☆423Updated last year
- Reference implementation of the Picnic post-quantum signature scheme☆157Updated last year