isislovecruft / library--
The papers and books I've read or am about to read.
☆1,083Updated 5 years ago
Alternatives and similar repositories for library--:
Users that are interested in library-- are comparing it to the libraries listed below
- A curated list of cryptography papers, articles, tutorials and howtos.☆1,848Updated 4 months ago
- A collection of common (interesting) cryptographic mistakes and learning resources.☆330Updated 6 months ago
- A place for useful crypto-related resources plus some of my fav stuff☆220Updated 3 years ago
- A curated list of resources about post-quantum cryptography☆272Updated 4 months ago
- (Still exploring) My cryptography journey: A collection of notebooks covering different algorithms and concepts from cryptography☆234Updated last year
- Lecture notes for a course on cryptography☆526Updated last year
- Library consisting of explanation and implementation of all the existing attacks on various Encryption Systems, Digital Signatures, Key E…☆1,519Updated 3 years ago
- A pure-Rust implementation of group operations on Ristretto and Curve25519☆943Updated last month
- Solutions to Matasano crypto challenges in Python 3.☆106Updated last year
- Guidelines for low-level cryptography software☆1,132Updated last year
- ☆137Updated last week
- Deployments of fancy cryptography☆134Updated last month
- Repository containing implementation of attacks on modern public key cryptosystems and symmetric key ciphers.☆127Updated 11 months ago
- A pure-Rust implementation of Bulletproofs using Ristretto.☆1,067Updated 6 months ago
- Libraries for finite field, elliptic curve, and polynomial arithmetic☆686Updated this week
- Cryptol: The Language of Cryptography☆1,143Updated this week
- msieve - Number Field Sieve implementation by Jason Papadopoulos☆233Updated last year
- Please see https://github.com/hacspec/hax☆242Updated last year
- A repository that aims to provide tools for cryptography and cryptanalysis☆205Updated 4 years ago
- JHU Advanced Topics in Applied Cryptography (601.745)☆52Updated 6 years ago
- EasyCrypt: Computer-Aided Cryptographic Proofs☆335Updated this week
- Clean, portable, tested implementations of post-quantum cryptography☆637Updated this week
- Factoring as a Service☆263Updated 2 years ago
- Known attacks on Elliptic Curve Cryptography☆386Updated 3 months ago
- A sorted and updated list of security wargame sites.☆962Updated this week
- Collection of pure Rust elliptic curve implementations: NIST P-224, P-256, P-384, P-521, secp256k1, SM2☆712Updated this week
- ☆434Updated last year
- A python implementation of the signature scheme Falcon☆163Updated 4 months ago
- SIDH Library is a fast and portable software library that implements state-of-the-art supersingular isogeny cryptographic schemes. The ch…☆323Updated last year
- Lattices in Cryptography (University of Michigan)☆76Updated 4 months ago