claucece / useful-crypto-resourcesLinks
A place for useful crypto-related resources plus some of my fav stuff
☆219Updated 4 years ago
Alternatives and similar repositories for useful-crypto-resources
Users that are interested in useful-crypto-resources are comparing it to the libraries listed below
Sorting:
- Experimental implementation of KEMTLS in Rustls☆31Updated last year
- JHU Advanced Topics in Applied Cryptography (601.745)☆53Updated 7 years ago
- A portable C library for generating cypto-secure random bytes☆99Updated 3 years ago
- A collection of common (interesting) cryptographic mistakes and learning resources.☆355Updated 2 months ago
- Deployments of fancy cryptography☆153Updated last month
- A list of the state of IETF protocols and PQC☆68Updated 2 months ago
- Intuitive Quantum Computation and Post-Quantum Cryptography☆63Updated 2 years ago
- Sphinx-based Password Storage low-level library☆130Updated 7 months ago
- SIDH Library is a fast and portable software library that implements state-of-the-art supersingular isogeny cryptographic schemes. The ch…☆326Updated 2 years ago
- Reference implementation of the Picnic post-quantum signature scheme☆165Updated 2 years ago
- A python library that implements a number of Privacy Enhancing Technolgies☆135Updated 2 years ago
- A curated list of resources about post-quantum cryptography.☆330Updated 2 weeks ago
- A party game for nerdy cryptographers. Shamelessly based on Cards Against Humanity.☆322Updated 5 years ago
- Exploration of NIST post-quantum signatures on-ramp candidates☆36Updated 3 months ago
- Clean, portable, tested implementations of post-quantum cryptography☆775Updated 4 months ago
- CryptoBib Main Repository for Developers☆19Updated last year
- Supersingular Isogeny-Based Cryptography constructions (python-code library)☆51Updated 3 years ago
- ☆143Updated 4 months ago
- MLS protocol☆240Updated 11 months ago
- SQISign: Short Quaternion and Isogeny Signature – C implementation based on PARI/GP (obsolete implementation)☆27Updated 2 years ago
- Guidelines for low-level cryptography software☆1,166Updated 2 years ago
- Oblivious Pseudorandom Functions (OPRFs) using Prime-Order Groups☆38Updated 11 months ago
- ☆82Updated 5 years ago
- The OPAQUE Asymmetric PAKE Protocol☆110Updated 7 months ago
- Blogs about Cryptography/Security to follow☆46Updated 3 years ago
- Crypto Audit Guidelines☆134Updated 4 years ago
- The SPHINCS+ reference code, accompanying the submission to NIST's Post-Quantum Cryptography project☆183Updated last year
- DEPRECATED – See NOTICE below about migration to new repository – Post-quantum key exchange from the ring learning with errors problem☆59Updated 8 years ago
- Lecture notes for a course on cryptography☆539Updated last year
- Small, self-contained C implementation of Ristretto255 based on libdecaf☆13Updated 6 years ago