nakov / Practical-Cryptography-for-Developers-BookLinks
Practical Cryptography for Developers: Hashes, MAC, Key Derivation, DHKE, Symmetric and Asymmetric Ciphers, Public Key Cryptosystems, RSA, Elliptic Curves, ECC, secp256k1, ECDH, ECIES, Digital Signatures, ECDSA, EdDSA
☆3,765Updated last year
Alternatives and similar repositories for Practical-Cryptography-for-Developers-Book
Users that are interested in Practical-Cryptography-for-Developers-Book are comparing it to the libraries listed below
Sorting:
- A curated list of cryptography papers, articles, tutorials and howtos.☆1,992Updated last year
- Guidelines for low-level cryptography software☆1,188Updated 2 years ago
- A curated list of cryptography resources and links.☆6,729Updated 8 months ago
- Crypto 101, the introductory book on cryptography.☆3,657Updated 2 years ago
- Lecture notes for a course on cryptography☆569Updated 2 years ago
- The Illustrated TLS 1.2 Connection: Every byte explained☆3,515Updated 6 months ago
- The Illustrated TLS 1.3 Connection: Every byte explained☆897Updated last month
- A collection about awesome blockchains - open distributed public databases w/ crypto hashes incl. git ;-). Blockchains are the new tulip…☆3,787Updated 3 years ago
- Learn to crypto workshop☆1,672Updated 3 years ago
- The papers and books I've read or am about to read.☆1,183Updated 6 years ago
- A curated list of awesome things related to learning Zero-Knowledge Proofs (ZKP).☆5,761Updated 2 weeks ago
- Intuitive Advanced Cryptography☆436Updated 3 years ago
- Computer Networks: A Systems Approach -- Textbook☆3,290Updated this week
- List of awesome reverse engineering resources☆9,913Updated 2 years ago
- ₿ A guide (for humans!) to cryto-currencies and their algos.☆4,057Updated 2 years ago
- A curated list of awesome reversing resources☆4,446Updated 2 years ago
- Hash collisions and exploitations☆3,320Updated 11 months ago
- A list of Reverse Engineering articles, books, and papers☆2,636Updated 2 years ago
- Project Wycheproof tests crypto libraries against known attacks.☆2,982Updated last week
- ☆454Updated 2 years ago
- A collection of common (interesting) cryptographic mistakes and learning resources.☆366Updated 7 months ago
- The Comprehensive Ethereum Reading List☆3,899Updated 2 years ago
- Library consisting of explanation and implementation of all the existing attacks on various Encryption Systems, Digital Signatures, Key E…☆1,595Updated 4 years ago
- ✏️ Learn how to write a hash table in C☆4,334Updated 2 years ago
- A collection of resources for linux reverse engineering☆2,067Updated 3 years ago
- A curated list of academic blockchain-related papers☆2,536Updated 2 years ago
- A curated list of multi party computation resources and links.☆1,953Updated 2 months ago
- ⚡️Curated list of resources for the development and applications of blockchain.☆3,590Updated last year
- Animation of the SHA-256 hash function in your terminal.☆3,390Updated last year
- Free copy of The Cyber Plumber's Handbook - The definitive guide to Secure Shell (SSH) tunneling, port redirection, and bending traffic l…☆2,733Updated 4 years ago