nakov / Practical-Cryptography-for-Developers-BookLinks
Practical Cryptography for Developers: Hashes, MAC, Key Derivation, DHKE, Symmetric and Asymmetric Ciphers, Public Key Cryptosystems, RSA, Elliptic Curves, ECC, secp256k1, ECDH, ECIES, Digital Signatures, ECDSA, EdDSA
☆3,659Updated last year
Alternatives and similar repositories for Practical-Cryptography-for-Developers-Book
Users that are interested in Practical-Cryptography-for-Developers-Book are comparing it to the libraries listed below
Sorting:
- A curated list of cryptography resources and links.☆6,266Updated 7 months ago
- A curated list of cryptography papers, articles, tutorials and howtos.☆1,888Updated 7 months ago
- Lecture notes for a course on cryptography☆530Updated last year
- Crypto 101, the introductory book on cryptography.☆3,047Updated last year
- Learn to crypto workshop☆1,673Updated 3 years ago
- Guidelines for low-level cryptography software☆1,154Updated last year
- Cryptographic library☆774Updated 4 months ago
- C library for prototyping and experimenting with quantum-resistant cryptography☆2,265Updated this week
- The Illustrated TLS 1.2 Connection: Every byte explained☆3,494Updated 5 months ago
- List of awesome reverse engineering resources☆9,389Updated last year
- A collection about awesome blockchains - open distributed public databases w/ crypto hashes incl. git ;-). Blockchains are the new tulip…☆3,755Updated 2 years ago
- A curated list of awesome reversing resources☆4,274Updated last year
- File formats☆956Updated 2 years ago
- This guide details creating a secure Linux production system. OpenSCAP (C2S/CIS, STIG).☆10,164Updated 6 months ago
- Library consisting of explanation and implementation of all the existing attacks on various Encryption Systems, Digital Signatures, Key E…☆1,557Updated 3 years ago
- A collection of resources for linux reverse engineering☆2,040Updated 3 years ago
- Awesome list of distributed systems resources☆1,595Updated 4 years ago
- ☆438Updated last year
- Computer Networks: A Systems Approach -- Textbook☆3,197Updated last week
- How to systematically secure anything: a repository about security engineering☆10,105Updated 2 years ago
- Animation of the SHA-256 hash function in your terminal.☆3,360Updated last year
- Peer-to-Peer Databases for the Decentralized Web☆8,536Updated last week
- Reverse Engineering Resources About All Platforms(Windows/Linux/macOS/Android/iOS/IoT) And Every Aspect! (More than 3500 open source tool…☆4,674Updated 3 years ago
- A simple stack-based virtual machine that runs C in the browser.☆661Updated 2 years ago
- A curated list of multi party computation resources and links.☆1,860Updated 2 months ago
- A collection of common (interesting) cryptographic mistakes and learning resources.☆339Updated last month
- An FHE compiler for C++☆3,570Updated 3 weeks ago
- Hash collisions and exploitations☆3,207Updated 3 months ago
- Awesome Firmware Security & Other Helpful Documents☆596Updated 5 years ago
- an awesome list of decentralized services and technologies☆1,641Updated last year