dylanmc / CryptoBookLinks
Learning Cryptography, math and programming with Cryptol (and maybe some Python)
☆95Updated 6 years ago
Alternatives and similar repositories for CryptoBook
Users that are interested in CryptoBook are comparing it to the libraries listed below
Sorting:
- Links to stuff arising from or related to the HACS workshop.☆34Updated 7 years ago
- Standalone Ethereum Virtual Machine☆52Updated 3 years ago
- convert simple cryptol expressions into finite-state machines☆20Updated 7 years ago
- Amœba is a distributed network.☆18Updated 11 years ago
- Cryptographic library for Haskell☆68Updated 3 months ago
- IPython-style interaction for Cryptol☆15Updated 8 years ago
- Tool for uploading unikernels into EC2☆76Updated 6 years ago
- Supporting materials for our EuroS&P paper: Automated Verification for Secure Messaging Protocols and their Implementations: A Symbolic a…☆36Updated 3 years ago
- A concurrency framework for the Ivory language☆43Updated 5 years ago
- Some writings about a type system for nix☆19Updated 7 years ago
- Tool to determine relevant parts of binary data☆44Updated 7 years ago
- Small minimal examples of modern cryptographic techniques in Haskell☆79Updated 5 years ago
- Authenticated encryption scheme prover/synthesizer☆15Updated 2 years ago
- An experimental grammar fuzzer in Haskell using QuickCheck☆201Updated 5 years ago
- Introduction to using the Hammer parser construction toolkit by Meredith L. Patterson☆81Updated 8 years ago
- ☆23Updated 13 years ago
- IP-format-preserving encryption, with a dedicated 4-byte cipher☆106Updated 4 years ago
- Verified iptables Firewall Ruleset Analysis☆98Updated 11 months ago
- Easily create authenticated data structures☆43Updated 2 years ago
- Hackage security framework based on TUF (The Update Framework)☆57Updated last month
- A fast, low-level HTTP server you can trust☆47Updated 6 years ago
- Allows to execute haskell code in Ida Pro.☆27Updated 9 years ago
- Haskell implementation of Metasploit remote API☆20Updated 9 years ago
- Double ratchet algorithm for E2E encryption☆59Updated 6 years ago
- The haskell network stack☆115Updated 7 years ago
- reading lists☆31Updated 6 years ago
- How to model of Deck of Cards in Haskell☆9Updated 9 years ago
- n queens with the logic monad☆20Updated 10 years ago
- Kudelski Security's 2018 pre-Black Hat crypto challenge☆36Updated 6 years ago
- Embedded-friendly crypto a la SMACCM☆12Updated 7 years ago