isislovecruft / library--
The papers and books I've read or am about to read.
☆1,011Updated 5 years ago
Related projects ⓘ
Alternatives and complementary repositories for library--
- A curated list of cryptography papers, articles, tutorials and howtos.☆1,806Updated last month
- (Still exploring) My cryptography journey: A collection of notebooks covering different algorithms and concepts from cryptography☆226Updated last year
- Guidelines for low-level cryptography software☆1,110Updated last year
- A collection of common (interesting) cryptographic mistakes and learning resources.☆319Updated 3 months ago
- Lecture notes for a course on cryptography☆514Updated 11 months ago
- A curated list of cryptography resources and links.☆5,903Updated last month
- A pure-Rust implementation of Bulletproofs using Ristretto.☆1,051Updated 4 months ago
- Cryptol: The Language of Cryptography☆1,137Updated this week
- Repository containing implementation of attacks on modern public key cryptosystems and symmetric key ciphers.☆118Updated 8 months ago
- Library consisting of explanation and implementation of all the existing attacks on various Encryption Systems, Digital Signatures, Key E…☆1,495Updated 3 years ago
- A pure-Rust implementation of group operations on Ristretto and Curve25519☆902Updated last month
- EasyCrypt: Computer-Aided Cryptographic Proofs☆320Updated this week
- A curated list of resources about post-quantum cryptography☆253Updated 2 months ago
- Linux Binary Exploitation☆1,304Updated 3 years ago
- Λ ⚬ λ: Functional Lattice Cryptography☆225Updated 3 years ago
- ☆133Updated 2 years ago
- A curated list of multi party computation resources and links.☆1,762Updated last month
- Lattices in Cryptography (University of Michigan)☆69Updated last month
- Interfaces for Relations and SNARKs for these relations☆794Updated 3 weeks ago
- Spartan: High-speed zkSNARKs without trusted setup☆696Updated last month
- Deployments of fancy cryptography☆125Updated 3 weeks ago
- Python 3 solutions to the original set of the Matasano Cryptopals cryptographic challenges☆94Updated 7 years ago
- attacking RSA via lattice reductions (LLL)☆774Updated 3 years ago
- Advanced crypto library for the Go language☆643Updated 2 weeks ago
- Libraries for finite field, elliptic curve, and polynomial arithmetic☆644Updated this week
- A SageMath implementation of the Castryck-Decru Key Recovery attack on SIDH☆122Updated last year
- A list of system papers using/about Intel SGX☆517Updated 4 months ago
- mirror of gera's insecure programming examples | http://community.coresecurity.com/~gera/InsecureProgramming/☆269Updated 4 years ago
- Intuitive Advanced Cryptography☆430Updated 2 years ago