CryptoBib Database for Developers
☆46Apr 22, 2026Updated 3 weeks ago
Alternatives and similar repositories for db
Users that are interested in db are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- CryptoBib BibTex files☆66Apr 22, 2026Updated 3 weeks ago
- CryptoBib Main Repository for Developers☆22Aug 21, 2024Updated last year
- Implementation of cryptographic primitives in Go☆13Mar 13, 2023Updated 3 years ago
- LaTeX class for the IACR Transactions on Symmetric Cryptology☆39Aug 6, 2024Updated last year
- [work in progress] Python framework for supporting cryptographic game-hopping proofs☆13Oct 19, 2022Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆11Jan 24, 2019Updated 7 years ago
- C implementation of the CLT13 multilinear map☆14Nov 29, 2018Updated 7 years ago
- A lecture on quantum computing and symmetric-key cryptography at Chinese Academy of Sciences☆16Nov 19, 2020Updated 5 years ago
- An interactive notebook for understanding the relation between mutual information, perceived and hypothetical information☆12Feb 28, 2020Updated 6 years ago
- Rust implementation of the BMR16 arithmetic garbling scheme.☆35Dec 19, 2019Updated 6 years ago
- Go wrapper for liboqs; allows Go applications to use quantum-resistant KEMs☆15May 24, 2019Updated 6 years ago
- Fast 4 way vectorized ladder for the complete set of Montgomery curves☆11Feb 13, 2019Updated 7 years ago
- FLECC_IN_C is a FLexible Elliptic Curve Cryptography library written IN C☆18Nov 17, 2017Updated 8 years ago
- An open source project for study S-boxes☆45Sep 28, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Attacks on Jarvis and Friday☆10Oct 9, 2019Updated 6 years ago
- Updated! (Dec2-2019) This is a C-language software library that provides optimized implementations of the Diffie-Hellman functions known …☆44Nov 10, 2023Updated 2 years ago
- Lattices and Their Algorithms, Leiden, Spring 2024☆24Aug 13, 2024Updated last year
- Theory of Computing Report☆14Nov 13, 2025Updated 6 months ago
- Tools to optimize small functions, such as S-boxes, for several criteria using SAT solvers☆28Jul 13, 2017Updated 8 years ago
- A Sage interface for FGb (Gröbner basis computations)☆38Feb 1, 2026Updated 3 months ago
- ☆10Apr 18, 2017Updated 9 years ago
- Parses https://eprint.iacr.org/eprint-bin/search.pl?last=365&title=1 and sends you an email with the latest papers☆15Nov 11, 2020Updated 5 years ago
- A curated list of papers relating to position-based quantum cryptography (PBQC).☆20Aug 25, 2025Updated 8 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Crypto library☆70Dec 9, 2025Updated 5 months ago
- WP6 of the SAFEcrypto project - a suite of lattice-based cryptographic schemes☆38Mar 9, 2023Updated 3 years ago
- Banquet implementation☆15May 6, 2022Updated 4 years ago
- ☆13Oct 7, 2019Updated 6 years ago
- ☆12Apr 27, 2024Updated 2 years ago
- A Basic SPN cryptanalysis☆15Dec 1, 2021Updated 4 years ago
- Hardware designs for fault detection☆21Apr 13, 2020Updated 6 years ago
- Yet Another Toolkit for Analysis of ARX Cryptographic Algorithms☆34Jan 17, 2022Updated 4 years ago
- ☆14Mar 3, 2021Updated 5 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- AVX implementation of the Skinny block cipher☆12Apr 24, 2022Updated 4 years ago
- 🍒 A massif (Valgrind) extension to analyze partial memory consumptions☆23Dec 6, 2016Updated 9 years ago
- An easy to use tool for evaluating the security of cryptographic algorithms against integral attacks.☆25Jan 20, 2019Updated 7 years ago
- Hybrid Public Key Encryption☆51Jul 10, 2024Updated last year
- DARPA Cyber Grand Challenge OS syscall library☆19Feb 1, 2017Updated 9 years ago
- An Implementation of the Number Theoretic Transform☆51Aug 23, 2023Updated 2 years ago
- convert simple cryptol expressions into finite-state machines☆22Sep 15, 2017Updated 8 years ago