cryptosubtlety / intuitive-advanced-cryptographyLinks
Intuitive Advanced Cryptography
☆437Updated 3 years ago
Alternatives and similar repositories for intuitive-advanced-cryptography
Users that are interested in intuitive-advanced-cryptography are comparing it to the libraries listed below
Sorting:
- A collection of common (interesting) cryptographic mistakes and learning resources.☆350Updated last month
- Lecture notes for a course on cryptography☆538Updated last year
- A Fully Homomorphic Encryption Brainfuck virtual machine☆217Updated 5 years ago
- Cingulata (pronounced "tchingulata") is a compiler toolchain and RTE for running C++ programs over encrypted data by means of fully homom…☆407Updated last month
- The SHA-256 Project, developed for NYU Tandon's Applied Cryptography course☆544Updated 3 weeks ago
- A Rust library for lattice-based additive homomorphic encryption.☆417Updated last year
- Guidelines for low-level cryptography software☆1,162Updated 2 years ago
- Flexible and Constant Time Programming Language☆201Updated 3 years ago
- Jupyter notebook for explaining elliptic curve encryption☆88Updated 4 years ago
- Constant-Time Toolkit☆296Updated 6 years ago
- problem sets for CS-GY 6903 Applied Cryptography☆41Updated 3 years ago
- Bulletproofs are short non-interactive zero-knowledge proofs that require no trusted setup☆542Updated 2 years ago
- Intuitive Quantum Computation and Post-Quantum Cryptography☆63Updated 2 years ago
- Timelock Encryption made practical. The Go `tlock` library and the `tle` cmd line tool home to encrypt towards the future.☆545Updated last month
- SDK for private data access, built on homomorphic encryption.☆351Updated last year
- Crypto Audit Guidelines☆134Updated 4 years ago
- Deployments of fancy cryptography☆151Updated 2 weeks ago
- ☆140Updated 3 months ago
- Cryptographic Primitive Code Generation by Fiat☆769Updated last week
- dude, is my code constant time?☆183Updated last year
- Testing Schnorr's factorization claim in Sage☆305Updated 2 years ago
- A curated list of resources about post-quantum cryptography.☆324Updated 2 months ago
- An animated visualization of elliptic curve cryptography☆144Updated 2 weeks ago
- A "living" Linux process with no memory☆344Updated 5 years ago
- An intuitive and visual guide to understanding Maxwell's equations.☆795Updated 5 years ago
- Paper and Demo Implementation of Paradoxical Compression with VDF☆173Updated 3 years ago
- A party game for nerdy cryptographers. Shamelessly based on Cards Against Humanity.☆322Updated 5 years ago
- ☆214Updated 4 years ago
- An introduction to temporal logic and how it can be used to analyze concurrency☆105Updated last year
- Λ ⚬ λ: Functional Lattice Cryptography☆231Updated 4 years ago