cryptosubtlety / intuitive-advanced-cryptography
Intuitive Advanced Cryptography
☆432Updated 2 years ago
Alternatives and similar repositories for intuitive-advanced-cryptography:
Users that are interested in intuitive-advanced-cryptography are comparing it to the libraries listed below
- A collection of common (interesting) cryptographic mistakes and learning resources.☆331Updated 6 months ago
- The SHA-256 Project, developed for NYU Tandon's Applied Cryptography course☆537Updated 2 years ago
- Cingulata (pronounced "tchingulata") is a compiler toolchain and RTE for running C++ programs over encrypted data by means of fully homom…☆406Updated last year
- Constant-Time Toolkit☆295Updated 6 years ago
- Lecture notes for a course on cryptography☆527Updated last year
- Intuitive Quantum Computation and Post-Quantum Cryptography☆62Updated 2 years ago
- A Rust library for lattice-based additive homomorphic encryption.☆415Updated last year
- problem sets for CS-GY 6903 Applied Cryptography☆39Updated 3 years ago
- A Fully Homomorphic Encryption Brainfuck virtual machine☆215Updated 5 years ago
- Crypto Audit Guidelines☆133Updated 4 years ago
- Flexible and Constant Time Programming Language☆199Updated 3 years ago
- Guidelines for low-level cryptography software☆1,134Updated last year
- A "living" Linux process with no memory☆343Updated 4 years ago
- Jupyter notebook for explaining elliptic curve encryption☆86Updated 4 years ago
- Obuscated C Christmas programs☆377Updated 2 years ago
- Utility to find AES keys in running processes☆334Updated last year
- A curated list of examples of self-reference in art, science, and technology☆266Updated 5 months ago
- Bulletproofs are short non-interactive zero-knowledge proofs that require no trusted setup☆540Updated 2 years ago
- Cryptographic Primitive Code Generation by Fiat☆740Updated this week
- Deployments of fancy cryptography☆134Updated last month
- Using z3's never been easier (maybe)☆101Updated 3 years ago
- Please see https://github.com/hacspec/hax☆242Updated last year
- A curated list of resources about post-quantum cryptography☆273Updated 5 months ago
- An interactive course to git☆63Updated 3 years ago
- Constantine: modular, high-performance, zero-dependency cryptography stack for verifiable computation, proof systems and blockchain prot…☆445Updated this week
- dude, is my code constant time?☆176Updated 11 months ago
- Authenticated key-value store (i.e. an urkel tree)☆316Updated 2 years ago
- Timelock Encryption made practical. The Go `tlock` library and the `tle` cmd line tool home to encrypt towards the future.☆535Updated 2 weeks ago
- Linux for Networking Professionals, published by Packt☆221Updated 2 years ago
- ☆216Updated 3 years ago