crypto101 / bookLinks
Crypto 101, the introductory book on cryptography.
☆3,071Updated last year
Alternatives and similar repositories for book
Users that are interested in book are comparing it to the libraries listed below
Sorting:
- A curated list of cryptography resources and links.☆6,360Updated last month
- Useful IT policies☆4,892Updated last year
- Project Wycheproof tests crypto libraries against known attacks.☆2,851Updated this week
- Functional Programming concepts, examples and patterns illustrated in Haskell, Ocaml and Python☆2,695Updated 5 years ago
- List of resources about programming practices for writing safety-critical software.☆1,569Updated 4 months ago
- *This project is no longer actively maintained. If you'd like to become the maintainer, please let us know.* ZeroDB is an end-to-end encr…☆1,556Updated 7 years ago
- A ssh server that knows who you are. $ ssh whoami.filippo.io☆2,264Updated 11 months ago
- Learn to crypto workshop☆1,672Updated 3 years ago
- Source for the little book about OS development☆2,524Updated 2 years ago
- HTML5/EPUB3 version of SICP☆4,436Updated 2 years ago
- A collection of debugging stories. PRs welcome (sorry for the backlog) :-)☆3,807Updated last year
- security tips for startups☆4,628Updated 3 years ago
- A collected list of awesome security talks☆4,121Updated 4 years ago
- The Illustrated TLS 1.3 Connection: Every byte explained☆868Updated 8 months ago
- Library and command line tool to detect SHA-1 collision in a file☆1,362Updated 11 months ago
- A curated list of resources for learning about application security☆6,584Updated 4 months ago
- Practical Cryptography for Developers: Hashes, MAC, Key Derivation, DHKE, Symmetric and Asymmetric Ciphers, Public Key Cryptosystems, RSA…☆3,675Updated last year
- Private messaging system that hides metadata☆2,483Updated 5 years ago
- Bottom Up Computer Science☆1,514Updated last year
- Big-O Complexities / Poster of common algorithms used in Computer Science☆1,652Updated 3 years ago
- The Illustrated TLS 1.2 Connection: Every byte explained☆3,502Updated 6 months ago
- Advanced library for randomization, hashing and statistical analysis (devoted to chaos machines).☆1,611Updated 5 years ago
- Some public notes☆1,273Updated 6 years ago
- A curated list of awesome bitwise operations and tricks☆3,087Updated last year
- This book on heap exploitation is a guide to understanding the internals of glibc's heap and various attacks possible on the heap structu…☆1,261Updated 2 years ago
- Programming Language Theory λΠ☆5,304Updated 7 months ago
- Computer Science Cheatsheets.☆1,602Updated 4 years ago
- PDF on Git Internals☆2,600Updated 2 years ago
- A reading list for infosec engineers☆535Updated 7 years ago
- A searchable, syncable, content-addressable notetaking system☆1,036Updated 8 years ago