mgraczyk / coursera-crypto1Links
Coursera Stanford Cryptography 1
☆75Updated 11 years ago
Alternatives and similar repositories for coursera-crypto1
Users that are interested in coursera-crypto1 are comparing it to the libraries listed below
Sorting:
- Assignments for Coursera's Cryptography I course by Dan Boneh☆124Updated 10 years ago
- Solutions for the Matasano Crypto Challenges☆23Updated 6 years ago
- Solutions to Matasano crypto challenges in Python 3.☆108Updated 2 years ago
- Large-scale Analysis of Cryptographic Misuse in IoT Devices☆22Updated 5 years ago
- Implementation of attacks on cryptosystems☆73Updated 4 years ago
- Attacking A Many Time Pad - Cryptography☆51Updated 3 years ago
- Problems related to computer security. Algorithms written in Python. Learn more: https://id0-rsa.pub/☆72Updated 8 years ago
- Working with numbers (primes, modular, etc.)☆242Updated 3 years ago
- Writeups for past CTFs I've joined☆18Updated 4 years ago
- A "Hello World" Intel SGX enclave program☆91Updated 4 years ago
- DARPA Cyber Grand Challenge Sample Challenges☆324Updated 7 years ago
- My solutions to the Matasano Crypto Challenges. Written as a project for learning python.☆35Updated 10 years ago
- IoT Reading List (IoT research papers from 2016 to 2019)☆85Updated 6 years ago
- SGX Tutorial at CCS17: SGX Security and Privacy☆86Updated 7 years ago
- cribdrag - an interactive crib dragging tool for cryptanalysis on ciphertext generated with reused or predictable stream cipher keys☆175Updated 4 years ago
- SGX command-line tools and paper☆146Updated 8 years ago
- ☆77Updated 7 years ago
- White-box Analysis and Implementation Tools☆75Updated 3 years ago
- Small python module for common CTF crypto functions☆166Updated 2 years ago
- ☆88Updated 7 years ago
- A repository that aims to provide tools for cryptography and cryptanalysis☆216Updated 5 years ago
- Solutions to a variety of Capture The Flag challenges from different competitions.☆212Updated 6 years ago
- A vulnerable C program for testing fuzzers.☆199Updated 2 years ago
- Implements Coron's simplification of Coppersmith's algorithm☆42Updated last year
- Practical CTF Hacking book, created by and for this class.☆52Updated 10 years ago
- First practical showcase for leaking secret encryption keys from a secure SGX enclave.☆20Updated 8 years ago
- Practise CTF every day!☆111Updated 8 years ago
- My solutions and explanations of the http://cryptopals.com/ challenges.☆26Updated 4 years ago
- Research paper collection for Linux kernel security from top security conferences.☆77Updated 7 years ago
- An Automated Vulnerability Detection System☆60Updated 8 years ago