manjunath5496 / Cryptography-Books
"One must acknowledge with cryptography no amount of violence will ever solve a math problem." ― Jacob Appelbaum
☆57Updated 5 years ago
Alternatives and similar repositories for Cryptography-Books:
Users that are interested in Cryptography-Books are comparing it to the libraries listed below
- "To competently perform rectifying security service, two critical incident response elements are necessary: information and organization.…☆54Updated 4 years ago
- (Still exploring) My cryptography journey: A collection of notebooks covering different algorithms and concepts from cryptography☆239Updated last year
- A collection of introductory cybersecurity projects that I have completed in my spare time.☆34Updated 2 years ago
- ☆140Updated 2 months ago
- This is my personal (big) recopilation about cryptanalysis, crypto tools and challenges☆76Updated last year
- A curated list of resources about post-quantum cryptography☆280Updated 7 months ago
- A community driven resource for learning CryptoGraphy☆64Updated 2 years ago
- Cryptography in SageMath.☆8Updated 9 years ago
- Supersingular Isogeny-Based Cryptography constructions (python-code library)☆50Updated 2 years ago
- List of projects and assignments for Applied Crytography☆35Updated 9 years ago
- A collection of awesome software, libraries, documents, books, resources and cool stuff about cryptography in Cybersecurity.☆20Updated last year
- CTF Beginners Guide!!☆59Updated 5 years ago
- All Cryptography Algorithms are implemented in C.☆11Updated 4 years ago
- Free Access Books/Resources for Computer Engineering (and Computer Science) Students☆79Updated 2 years ago
- A curated list of awesome blockchain security resources☆26Updated last year
- MSc module in Applied Cryptography - CSN11131☆61Updated 2 weeks ago
- A curated list of educational materials, guides, and research papers for beginners interested in learning about Fully Homomorphic Encrypt…☆10Updated 8 months ago
- Solutions and writeups for the picoCTF Cybersecurity Competition held by Carnegie Mellon University☆39Updated 4 years ago
- MPC with ESP32 hardware devices, using Arduino C++☆10Updated 3 months ago
- Writeups for the Hack The Box Cyber Apocalypse 2023 CTF contest☆31Updated 2 years ago
- Coursera Stanford Cryptography 1 - Thought by Prof. Dan Boneh☆38Updated 8 years ago
- "Programmers are not to be measured by their ingenuity and their logic but by the completeness of their case analysis." ― Alan J. Perlis☆75Updated 3 years ago
- Resources for learning about cybersecurity and CTFs☆205Updated 2 years ago
- "Learning networking basics is only a gateway to career growth and exploration." - Tae Yoo☆64Updated 6 years ago
- Lattices in Cryptography (University of Michigan)☆82Updated 7 months ago
- lattice-based zkSNARKs over libsnark [ISW21]☆32Updated 6 months ago
- "Despite much talk about the cyber economy, information age, or the knowledge-based enterprise, as yet there are no generally accepted …☆20Updated 4 years ago
- Verifiable FHE prototype☆23Updated 8 months ago
- A library for lattice-based multiparty homomorphic encryption in Go☆12Updated 4 months ago
- ☆16Updated 2 weeks ago