cpeikert / TheoryOfCryptography
Lecture notes for Chris Peikert's graduate-level Theory of Cryptography course
☆167Updated last year
Alternatives and similar repositories for TheoryOfCryptography:
Users that are interested in TheoryOfCryptography are comparing it to the libraries listed below
- Lattices in Cryptography (University of Michigan)☆82Updated 6 months ago
- An attempt at a new LWE estimator☆253Updated 3 weeks ago
- LaTeX package for typesetting pseudocode and cryptographic games☆163Updated last year
- A sage Toolkit for mounting/estimating attacks on LWE with Side Information☆41Updated last year
- CryptoBib BibTex files☆56Updated 2 months ago
- A SageMath implementation of the Castryck-Decru Key Recovery attack on SIDH☆127Updated last year
- MIT 6.875☆14Updated last year
- A Cryptographic Library for the Automated Analysis of Symmetric Primitives☆62Updated this week
- This project gathers and standardize command line scripts to estimate the difficulty of solving hard mathematical problems related to cry…☆41Updated last week
- ☆10Updated 5 years ago
- Λ ⚬ λ: Functional Lattice Cryptography☆230Updated 4 years ago
- Supersingular Isogeny-Based Cryptography constructions (python-code library)☆50Updated 2 years ago
- Experiments with Universal Composability in EasyCrypt☆33Updated last week
- The General Sieve Kernel☆108Updated 3 months ago
- Language for high-assurance and high-speed cryptography☆288Updated this week
- Rust implementation of the BMR16 arithmetic garbling scheme.☆34Updated 5 years ago
- ☆40Updated 4 months ago
- The fully homomorhic encryption scheme based on NTRU and LWE.☆40Updated 6 months ago
- A rust and SageMath implementation of (2,2)-isogenies in the theta model☆19Updated 2 months ago
- Exploration of NIST post-quantum signatures on-ramp candidates☆29Updated last month
- Repository for the SoK paper on Fully Homomorphic Encryption (FHE) compilers.☆78Updated 2 years ago
- An implementation of the LowMC block cipher family.☆26Updated 7 years ago
- EasyCrypt: Computer-Aided Cryptographic Proofs☆343Updated last week
- Lecture notes on the Foundations of Isogeny-based Cryptography☆28Updated 6 months ago
- A two-party secure function evaluation using Yao's garbled circuit protocol☆74Updated 9 months ago
- ☆36Updated 2 years ago
- Scripts for the 'Breaking Rainbow takes a Weekend on a Laptop' paper☆80Updated 2 years ago
- An efficient, user-friendly, modular, and extensible framework for mixed-protocol secure multi-party computation with two or more parties☆86Updated last year
- ☆14Updated 2 weeks ago
- ☆19Updated 6 years ago