cryptosubtlety / intuitive-advanced-cryptography
Intuitive Advanced Cryptography
☆430Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for intuitive-advanced-cryptography
- A collection of common (interesting) cryptographic mistakes and learning resources.☆318Updated 2 months ago
- The SHA-256 Project, developed for NYU Tandon's Applied Cryptography course☆534Updated 2 years ago
- Cingulata (pronounced "tchingulata") is a compiler toolchain and RTE for running C++ programs over encrypted data by means of fully homom…☆404Updated 9 months ago
- A Fully Homomorphic Encryption Brainfuck virtual machine☆214Updated 4 years ago
- Guidelines for low-level cryptography software☆1,106Updated last year
- Constant-Time Toolkit☆294Updated 6 years ago
- A Rust library for lattice-based additive homomorphic encryption.☆407Updated last year
- Lecture notes for a course on cryptography☆511Updated 10 months ago
- problem sets for CS-GY 6903 Applied Cryptography☆39Updated 2 years ago
- Flexible and Constant Time Programming Language☆198Updated 2 years ago
- Bulletproofs are short non-interactive zero-knowledge proofs that require no trusted setup☆535Updated last year
- Timelock Encryption made practical. The Go `tlock` library and the `tle` cmd line tool home to encrypt towards the future.☆514Updated 3 weeks ago
- Intuitive Quantum Computation and Post-Quantum Cryptography☆62Updated 2 years ago
- Crypto Audit Guidelines☆132Updated 3 years ago
- Authenticated key-value store (i.e. an urkel tree)☆315Updated last year
- Using z3's never been easier (maybe)☆100Updated 2 years ago
- A Course in Cryptanalysis☆131Updated 3 weeks ago
- Fuzzing cryptographic libraries. Magic bug printer go brrrr.☆682Updated last week
- Cryptographic Primitive Code Generation by Fiat☆713Updated this week
- Authenticated multi-version database: sparse binary merkle tree with compact partial-tree proofs☆300Updated last year
- A "living" Linux process with no memory☆342Updated 4 years ago
- dude, is my code constant time?☆176Updated 7 months ago
- SDK for private data access, built on homomorphic encryption.☆337Updated 7 months ago
- Jupyter notebook for explaining elliptic curve encryption☆86Updated 3 years ago
- Deployments of fancy cryptography☆124Updated last week
- Ledger's Advanced Side-Channel Analysis Repository☆376Updated last year
- Λ ⚬ λ: Functional Lattice Cryptography☆224Updated 3 years ago
- A curated list of resources about post-quantum cryptography☆249Updated last month
- Testing Schnorr's factorization claim in Sage☆303Updated 2 years ago
- My personal repository of formally verified mathematics.☆291Updated last week