crypto101 / book
Crypto 101, the introductory book on cryptography.
☆3,015Updated last year
Alternatives and similar repositories for book:
Users that are interested in book are comparing it to the libraries listed below
- Source for the little book about OS development☆2,255Updated last year
- Programming Language Theory λΠ☆5,255Updated last month
- Project Wycheproof tests crypto libraries against known attacks.☆2,801Updated 5 months ago
- List of crypto projects that might not suck☆424Updated 2 years ago
- A short tutorial about building Linux based operating systems.☆5,153Updated 7 months ago
- A curated list of cryptography resources and links.☆6,040Updated 3 months ago
- A curated list of cryptography papers, articles, tutorials and howtos.☆1,835Updated 3 months ago
- Functional Programming concepts, examples and patterns illustrated in Haskell, Ocaml and Python☆2,694Updated 5 years ago
- A searchable, syncable, content-addressable notetaking system☆1,033Updated 7 years ago
- A collected list of awesome security talks☆4,073Updated 3 years ago
- Practical Cryptography for Developers: Hashes, MAC, Key Derivation, DHKE, Symmetric and Asymmetric Ciphers, Public Key Cryptosystems, RSA…☆3,549Updated 7 months ago
- Hack Night is an open weekly training session run by the OSIRIS lab.☆1,235Updated 9 months ago
- List of resources about programming practices for writing safety-critical software.☆1,541Updated 8 months ago
- A curated list of resources for learning about application security☆6,403Updated 6 months ago
- Learn to crypto workshop☆1,672Updated 2 years ago
- ☆3,430Updated 3 years ago
- HTML5/EPUB3 version of SICP☆4,383Updated last year
- A curated list of awesome bitwise operations and tricks☆3,071Updated last year
- Advanced library for randomization, hashing and statistical analysis (devoted to chaos machines).☆1,609Updated 5 years ago
- How to backdoor Diffie-Hellman☆611Updated 8 years ago
- This book on heap exploitation is a guide to understanding the internals of glibc's heap and various attacks possible on the heap structu…☆1,252Updated 2 years ago
- A collection of debugging stories. PRs welcome (sorry for the backlog) :-)☆3,779Updated 7 months ago
- A critique of "How to C in 2016"☆529Updated 2 years ago
- Guidelines for low-level cryptography software☆1,124Updated last year
- Course materials for Modern Binary Exploitation by RPISEC☆5,562Updated 3 years ago
- The Illustrated TLS 1.2 Connection: Every byte explained☆3,469Updated 2 weeks ago
- So You Think You Can Program An Elevator☆1,380Updated 3 years ago
- A hacky debugger UI for hackers☆6,181Updated 6 months ago