oconnor663 / applied_crypto_2021_fallLinks
problem sets for CS-GY 6903 Applied Cryptography
☆41Updated 4 years ago
Alternatives and similar repositories for applied_crypto_2021_fall
Users that are interested in applied_crypto_2021_fall are comparing it to the libraries listed below
Sorting:
- Intuitive Advanced Cryptography☆436Updated 3 years ago
- A Fully Homomorphic Encryption Brainfuck virtual machine☆217Updated 6 years ago
- Intuitive Quantum Computation and Post-Quantum Cryptography☆63Updated 3 years ago
- PUREE: Password-based Uniform-Random-Equivalent Encryption☆64Updated 5 years ago
- An animated visualization of elliptic curve cryptography☆153Updated 5 months ago
- A collection of common (interesting) cryptographic mistakes and learning resources.☆364Updated 6 months ago
- Bertie TLS 1.3 Implementation☆129Updated 3 months ago
- Fish in a Barrel Memory Safety Bounty☆49Updated 4 years ago
- Economic and Banking System Simulation Framework.☆30Updated 2 years ago
- A Rust implementation of the Message Layer Security group messaging protocol☆116Updated 2 years ago
- ☆214Updated 4 years ago
- Blogs about Cryptography/Security to follow☆46Updated 4 years ago
- OPAQUE protocol, a secure asymmetric password authenticated key exchange (aPAKE) that supports mutual authentication in a client-server s…☆85Updated 2 weeks ago
- Explained from First Principles is a technology, science, and philosophy blog for curious people who want to understand and change the wo…☆124Updated 5 months ago
- A distributed hash table with unusually strong security properties☆65Updated 6 years ago
- A Rust library for lattice-based additive homomorphic encryption.☆418Updated 2 years ago
- Source Code Transparency☆11Updated 2 years ago
- Jupyter notebook for explaining elliptic curve encryption☆88Updated 4 years ago
- Flexible and Constant Time Programming Language☆204Updated 3 years ago
- Bounds on divsteps iterations in safegcd☆57Updated last year
- A description of the relationship between databases, collaboration and Kripke☆28Updated 4 years ago
- Crypto Audit Guidelines☆134Updated 5 years ago
- A light version of Tor portable to the browser☆120Updated 5 years ago
- Cryptanalysis of the Enigma machine in Rust.☆125Updated 4 years ago
- Deployments of fancy cryptography☆171Updated 3 months ago
- Infinitely presentable (aeon) rerandomisable (flux) anonymous credentials.☆29Updated 5 years ago
- A curated list of resources about post-quantum cryptography.☆356Updated 5 months ago
- ☆82Updated 5 years ago
- Mirror of all PDFs from the IACR's eprint☆47Updated 2 years ago
- Supporting materials for our EuroS&P paper: Automated Verification for Secure Messaging Protocols and their Implementations: A Symbolic a…☆37Updated 3 years ago