cryptosubtlety / intuitive-advanced-cryptography
Intuitive Advanced Cryptography
☆431Updated 2 years ago
Alternatives and similar repositories for intuitive-advanced-cryptography:
Users that are interested in intuitive-advanced-cryptography are comparing it to the libraries listed below
- A collection of common (interesting) cryptographic mistakes and learning resources.☆328Updated 5 months ago
- A Fully Homomorphic Encryption Brainfuck virtual machine☆214Updated 5 years ago
- The SHA-256 Project, developed for NYU Tandon's Applied Cryptography course☆536Updated 2 years ago
- Constant-Time Toolkit☆295Updated 6 years ago
- Flexible and Constant Time Programming Language☆198Updated 2 years ago
- Timelock Encryption made practical. The Go `tlock` library and the `tle` cmd line tool home to encrypt towards the future.☆535Updated last month
- Cingulata (pronounced "tchingulata") is a compiler toolchain and RTE for running C++ programs over encrypted data by means of fully homom…☆406Updated last year
- A Rust library for lattice-based additive homomorphic encryption.☆413Updated last year
- SDK for private data access, built on homomorphic encryption.☆342Updated 10 months ago
- Crypto Audit Guidelines☆133Updated 4 years ago
- problem sets for CS-GY 6903 Applied Cryptography☆39Updated 3 years ago
- Lecture notes for a course on cryptography☆523Updated last year
- Bulletproofs are short non-interactive zero-knowledge proofs that require no trusted setup☆538Updated 2 years ago
- Guidelines for low-level cryptography software☆1,127Updated last year
- Intuitive Quantum Computation and Post-Quantum Cryptography☆62Updated 2 years ago
- Jupyter notebook for explaining elliptic curve encryption☆86Updated 3 years ago
- An animated visualization of elliptic curve cryptography☆134Updated 4 months ago
- Cryptographic Primitive Code Generation by Fiat☆735Updated this week
- A curated list of resources about post-quantum cryptography☆269Updated 4 months ago
- Cryptographic Addition Chain Generation in Go☆188Updated 7 months ago
- An open source guide to mistake-resistant engineering(Work in progress)☆141Updated last year
- Authenticated multi-version database: sparse binary merkle tree with compact partial-tree proofs☆302Updated last year
- Please see https://github.com/hacspec/hax☆242Updated 11 months ago
- Deployments of fancy cryptography☆132Updated 3 weeks ago
- Ledger's Advanced Side-Channel Analysis Repository☆378Updated last year
- A light version of Tor portable to the browser☆120Updated 4 years ago
- Utility to find AES keys in running processes☆333Updated last year
- Authenticated key-value store (i.e. an urkel tree)☆316Updated last year
- A "living" Linux process with no memory☆343Updated 4 years ago
- Automated generation of provably secure, zero-copy parsers from format specifications☆261Updated this week