oconnor663 / applied_crypto_2021_fallLinks
problem sets for CS-GY 6903 Applied Cryptography
☆41Updated 3 years ago
Alternatives and similar repositories for applied_crypto_2021_fall
Users that are interested in applied_crypto_2021_fall are comparing it to the libraries listed below
Sorting:
- Intuitive Advanced Cryptography☆436Updated 3 years ago
- A Fully Homomorphic Encryption Brainfuck virtual machine☆216Updated 5 years ago
- A collection of common (interesting) cryptographic mistakes and learning resources.☆357Updated 3 months ago
- Fish in a Barrel Memory Safety Bounty☆47Updated 4 years ago
- Intuitive Quantum Computation and Post-Quantum Cryptography☆63Updated 3 years ago
- An animated visualization of elliptic curve cryptography☆147Updated 3 months ago
- A Rust implementation of the Message Layer Security group messaging protocol☆115Updated 2 years ago
- A Rust library for lattice-based additive homomorphic encryption.☆418Updated 2 years ago
- OPAQUE protocol, a secure asymmetric password authenticated key exchange (aPAKE) that supports mutual authentication in a client-server s…☆82Updated 4 years ago
- PUREE: Password-based Uniform-Random-Equivalent Encryption☆64Updated 5 years ago
- Explained from First Principles is a technology, science, and philosophy blog for curious people who want to understand and change the wo…☆123Updated 2 months ago
- Jupyter notebook for explaining elliptic curve encryption☆88Updated 4 years ago
- ☆213Updated 4 years ago
- Bertie TLS 1.3 Implementation☆125Updated 3 weeks ago
- Paper and Demo Implementation of Paradoxical Compression with VDF☆175Updated 3 years ago
- Rust library for cryptographic research☆143Updated 10 months ago
- Cryptanalysis of the Enigma machine in Rust.☆125Updated 4 years ago
- A practical experiment on supply-chain security using reproducible builds☆157Updated 2 years ago
- Economic and Banking System Simulation Framework.☆28Updated 2 years ago
- Please see https://github.com/hacspec/hax☆244Updated last year
- Bounds on divsteps iterations in safegcd☆54Updated last year
- The BLAKE3 paper: specifications, analysis, and design rationale☆182Updated 3 years ago
- SDK for private data access, built on homomorphic encryption.☆353Updated last year
- Source Code Transparency☆11Updated 2 years ago
- Research and proof of concept to develop the next SecureDrop with end to end encryption.☆48Updated this week
- Analysis of Bitcoin's current and future transaction throughput bottlenecks.☆111Updated 4 years ago
- Simple demo illustrating remanence of data in RAM (see Cold boot attack) using a Raspberry Pi. Loads many images of the Mona Lisa into R…☆103Updated last year
- Blogs about Cryptography/Security to follow☆46Updated 4 years ago
- A Coordination repo for all things Rust Cryptography oriented☆279Updated 8 months ago
- SHA256 sentence: discover a SHA256 checksum that matches a sentence's description of hex digit words.☆21Updated 6 months ago