fangpenlin / elliptic-curve-explainedLinks
Jupyter notebook for explaining elliptic curve encryption
☆88Updated 4 years ago
Alternatives and similar repositories for elliptic-curve-explained
Users that are interested in elliptic-curve-explained are comparing it to the libraries listed below
Sorting:
- A Fully Homomorphic Encryption Brainfuck virtual machine☆217Updated 5 years ago
- Optimized Binary GCD for Modular Inversion☆46Updated 4 years ago
- On Ends-to-Ends Encryption: Asynchronous Group Messaging with Strong Security Guarantees☆269Updated 3 years ago
- Intuitive Quantum Computation and Post-Quantum Cryptography☆63Updated 2 years ago
- Intuitive Advanced Cryptography☆436Updated 3 years ago
- An animated visualization of elliptic curve cryptography☆145Updated last month
- Lecture notes for a course on cryptography☆539Updated last year
- Host and publish your scientific papers on Xirva. HackFS 2021 winner project.☆47Updated 4 years ago
- Bounds on divsteps iterations in safegcd☆53Updated 10 months ago
- OPAQUE protocol, a secure asymmetric password authenticated key exchange (aPAKE) that supports mutual authentication in a client-server s…☆79Updated 4 years ago
- Simple bitcoin-like blockchain implementation written in rust☆40Updated 2 years ago
- Oblivious Pseudorandom Functions (OPRFs) using Prime-Order Groups☆38Updated 11 months ago
- Analysis of Bitcoin's current and future transaction throughput bottlenecks.☆111Updated 4 years ago
- Code for zero-knowledge middleboxes☆63Updated 3 years ago
- Mirror of all PDFs from the IACR's eprint☆47Updated last year
- Designing Secure Cryptography☆22Updated 6 years ago
- Crypto Audit Guidelines☆134Updated 4 years ago
- ☆28Updated 3 years ago
- Constant time big numbers for Go☆103Updated 6 months ago
- Anonymous RSA signatures☆67Updated last month
- Public repository for Blockchains and Cryptocurrencies (601.641/601.441) JHU (Fall 2020)☆58Updated 4 years ago
- Testing Schnorr's factorization claim in Sage☆305Updated 3 years ago
- Auditing Applied Cryptography☆10Updated 5 years ago
- Zero-related bugs in 4 BLS libs & standard draft,"splitting zero" attacks, $35000 award☆17Updated 4 years ago
- Xoodyak, a lightweight and versatile cryptographic scheme implemented in Rust.☆30Updated 4 months ago
- Notes on cryptographic schemes and attacks☆25Updated 6 years ago
- Optimized implementation of the Picnic signature scheme☆81Updated 2 years ago
- Bootstrapping Secure Communication without Leaking Metadata☆77Updated 5 years ago
- Pixel: Forward secure multi-signatures and threshold signatures☆17Updated 3 years ago
- A compiler for secure multiparty computation☆50Updated 8 years ago