ethanliuzhuo / CryptographyLinks
密码学教程,密码学数学原理,介绍一些经典密码学加密算法,并理解其中的数学知识
☆42Updated 3 years ago
Alternatives and similar repositories for Cryptography
Users that are interested in Cryptography are comparing it to the libraries listed below
Sorting:
- 初学者怎样学习密码学Cryptography☆111Updated 3 years ago
- ☆41Updated 2 years ago
- 全国密码技术竞赛论文 latex模板☆12Updated 2 years ago
- 《密码学》课程资料库☆66Updated 7 years ago
- Maintain a list of open source libraries of cryptographic excellence☆62Updated 2 years ago
- 可编辑区块链,基于以太坊智能合约的区块编辑抽象层,利用变色龙哈希实现对过去区块的修改删除等操作☆14Updated 4 years ago
- A page containing many useful links.☆26Updated 9 months ago
- 北京大学《应用密码学》研究生课程☆55Updated 2 years ago
- 公钥可搜索加密☆17Updated 4 years ago
- 对称可搜索加密,Cash的实现方案☆18Updated 7 years ago
- 变色龙哈希☆23Updated 4 years ago
- ☆25Updated 2 years ago
- 基于可编程不经意伪随机数的多方隐私求交算法库 Programmable Oblivious PRF & multi-party PSI☆26Updated 2 years ago
- Boolean Query SSE schemes☆16Updated 6 years ago
- The Description of the project you can watch my blog☆35Updated 4 years ago
- 基于可搜索加密的云存储方案☆26Updated 6 years ago
- Paper Notes in MPC with Applications to PPML☆69Updated last year
- Publicly Accountable Fine-Grained Blockchain Rewriting in Permissionless Setting☆17Updated 3 years ago
- Symmetric-key Hidden Vector Encryption Scheme☆19Updated 6 years ago
- ☆33Updated 5 years ago
- 基于同态加密的联邦学习安全聚合系统☆45Updated 4 years ago
- 2021-USTC-信息安全作品赛数据安全CP-ABE云数据系统项目, 基于CP-ABE方案实现安全的数据存储和访问服务的数据系统.☆17Updated 4 years ago
- 这是一个基于同态加密算法实现的隐私保护电子投票系统☆58Updated 3 years ago
- This is the implementation of the policy-based chameleon hash function with black-box accountability PCHBA. We use PCHBA to secure blockc…☆35Updated 3 years ago
- 可编辑区块链,使用基于RSA假设及因数分解的陷门哈希函数替换以太坊geth客户端的keccak256算法并开放出JSON-RPC接口,实现单节点修改指定区块数据、多节点同步修改区块数据的功能。☆17Updated 4 years ago
- Repository for collection of research papers on multi-party learning.☆32Updated last year
- 密码学教程,密码学基础,ctf密码学☆102Updated 6 years ago
- 2020清华大学软件学院应用密码学大作业☆11Updated 4 years ago
- A C++ library containing both easy-to-use lower level bigint/ecgroup interfaces and high-level cryptographical schemes/protocols.☆78Updated 11 months ago
- ☆20Updated 6 years ago