cryptosubtlety / intuitive-advanced-cryptographyLinks
Intuitive Advanced Cryptography
☆436Updated 3 years ago
Alternatives and similar repositories for intuitive-advanced-cryptography
Users that are interested in intuitive-advanced-cryptography are comparing it to the libraries listed below
Sorting:
- A collection of common (interesting) cryptographic mistakes and learning resources.☆361Updated 4 months ago
- Lecture notes for a course on cryptography☆550Updated last year
- Cingulata (pronounced "tchingulata") is a compiler toolchain and RTE for running C++ programs over encrypted data by means of fully homom…☆407Updated 5 months ago
- Guidelines for low-level cryptography software☆1,175Updated 2 years ago
- The SHA-256 Project, developed for NYU Tandon's Applied Cryptography course☆549Updated 4 months ago
- problem sets for CS-GY 6903 Applied Cryptography☆41Updated 3 years ago
- A Rust library for lattice-based additive homomorphic encryption.☆418Updated 2 years ago
- Constant-Time Toolkit☆299Updated 7 years ago
- A Fully Homomorphic Encryption Brainfuck virtual machine☆216Updated 5 years ago
- Flexible and Constant Time Programming Language☆202Updated 3 years ago
- Jupyter notebook for explaining elliptic curve encryption☆88Updated 4 years ago
- Timelock Encryption made practical. The Go `tlock` library and the `tle` cmd line tool home to encrypt towards the future.☆561Updated last week
- Cryptographic Primitive Code Generation by Fiat☆781Updated last week
- Intuitive Quantum Computation and Post-Quantum Cryptography☆63Updated 3 years ago
- SDK for private data access, built on homomorphic encryption.☆354Updated last year
- ☆144Updated 6 months ago
- Crypto Audit Guidelines☆134Updated 4 years ago
- Ledger's Advanced Side-Channel Analysis Repository☆399Updated 2 years ago
- Testing Schnorr's factorization claim in Sage☆305Updated 3 years ago
- Paper and Demo Implementation of Paradoxical Compression with VDF☆175Updated 3 years ago
- Deployments of fancy cryptography☆170Updated last month
- A party game for nerdy cryptographers. Shamelessly based on Cards Against Humanity.☆323Updated 5 years ago
- An introduction to temporal logic and how it can be used to analyze concurrency☆106Updated last year
- ☆453Updated 3 years ago
- Λ ⚬ λ: Functional Lattice Cryptography☆231Updated 4 years ago
- dude, is my code constant time?☆191Updated last year
- Checking that functions are constant time with Valgrind☆193Updated 8 years ago
- Obuscated C Christmas programs☆379Updated 3 years ago
- JHU Advanced Topics in Applied Cryptography (601.745)☆53Updated 7 years ago
- EasyCrypt: Computer-Aided Cryptographic Proofs☆372Updated this week