fangpenlin / elliptic-curve-explained
Jupyter notebook for explaining elliptic curve encryption
☆86Updated 4 years ago
Alternatives and similar repositories for elliptic-curve-explained:
Users that are interested in elliptic-curve-explained are comparing it to the libraries listed below
- Simple bitcoin-like blockchain implementation written in rust☆40Updated 2 years ago
- A Fully Homomorphic Encryption Brainfuck virtual machine☆217Updated 5 years ago
- An animated visualization of elliptic curve cryptography☆138Updated 6 months ago
- Host and publish your scientific papers on Xirva. HackFS 2021 winner project.☆47Updated 3 years ago
- Just a small test to see which language is better for extending python when using lists of lists☆31Updated last year
- Optimized Binary GCD for Modular Inversion☆43Updated 4 years ago
- SHA256 sentence: discover a SHA256 checksum that matches a sentence's description of hex digit words.☆21Updated last year
- Intuitive Quantum Computation and Post-Quantum Cryptography☆62Updated 2 years ago
- ☆96Updated 3 years ago
- problem sets for CS-GY 6903 Applied Cryptography☆39Updated 3 years ago
- Dumb, but easily verifiable implementations of crypto algorithms☆145Updated 6 years ago
- ☆214Updated 4 years ago
- The world's most expensive version of Conway's Game of Life - running on the Ethereum Blockchain☆82Updated 3 years ago
- Analysis of Bitcoin's current and future transaction throughput bottlenecks.☆111Updated 3 years ago
- Intuitive Advanced Cryptography☆434Updated 2 years ago
- Bounds on divsteps iterations in safegcd☆54Updated 6 months ago
- Escrovery - Decentralized Account Recovery With Escrowed Payments☆13Updated 5 years ago
- An implementation of ZKBoo☆33Updated 2 years ago
- Arithmetic and polynomial operations in finite fields.☆39Updated 2 years ago
- Notes on cryptographic schemes and attacks☆25Updated 6 years ago
- ☆64Updated 6 years ago
- Mirror of all PDFs from the IACR's eprint☆46Updated last year
- Anonymous RSA signatures☆68Updated last year
- ☆26Updated 2 years ago
- Curve ecGFp5☆68Updated 3 years ago
- Public attacknets available for eth2☆72Updated 3 years ago
- OPAQUE protocol, a secure asymmetric password authenticated key exchange (aPAKE) that supports mutual authentication in a client-server s…☆78Updated 3 years ago
- ShareLock: mixing for cryptocurrencies from multiparty ECDSA☆50Updated 2 years ago
- Beamsplitter - A new (possibly universal) hash that passes SMHasher. Built mainly with a random 10x64 S-box. Also in NodeJS☆91Updated last month
- Supporting evidence for security of the Jubjub curve to be used in Zcash☆16Updated 3 years ago