oconnor663 / applied_crypto_2021_fall
problem sets for CS-GY 6903 Applied Cryptography
☆39Updated 3 years ago
Alternatives and similar repositories for applied_crypto_2021_fall:
Users that are interested in applied_crypto_2021_fall are comparing it to the libraries listed below
- Bounds on divsteps iterations in safegcd☆52Updated 4 months ago
- A Fully Homomorphic Encryption Brainfuck virtual machine☆214Updated 5 years ago
- Flexible and Constant Time Programming Language☆198Updated 2 years ago
- Crypto library☆55Updated 3 months ago
- Bertie TLS 1.3 Implementation☆116Updated this week
- Intuitive Quantum Computation and Post-Quantum Cryptography☆62Updated 2 years ago
- Mirror of all PDFs from the IACR's eprint☆46Updated last year
- Verifying constant-time code with symbolic execution☆42Updated 3 years ago
- Rust library for cryptographic research☆137Updated last month
- ☆29Updated 3 years ago
- Intuitive Advanced Cryptography☆431Updated 2 years ago
- ☆136Updated this week
- A Rust implementation of the Message Layer Security group messaging protocol☆115Updated last year
- Oblivious Pseudorandom Functions (OPRFs) using Prime-Order Groups☆39Updated 4 months ago
- Reference implementations of post-quantum cryptographic primitives☆29Updated last year
- A distributed hash table with unusually strong security properties☆65Updated 5 years ago
- The formally verified crypto library for Rust☆98Updated this week
- Tools for power measurements of post-quantum cryptographic algorithms☆26Updated 5 years ago
- A collection of high-performance crypto implementations.☆44Updated this week
- SHA256 sentence: discover a SHA256 checksum that matches a sentence's description of hex digit words.☆21Updated last year
- A design for doing more private Signal groups using anonymous credentials based on algebraic MACs.☆14Updated 5 years ago
- Please see https://github.com/hacspec/hax☆242Updated 11 months ago
- Generate (message) sequence diagrams from TLA+ state traces☆73Updated last year
- Deployments of fancy cryptography☆132Updated 3 weeks ago
- OPAQUE protocol, a secure asymmetric password authenticated key exchange (aPAKE) that supports mutual authentication in a client-server s…☆74Updated 3 years ago
- Optimized Binary GCD for Modular Inversion☆41Updated 4 years ago
- Fish in a Barrel Memory Safety Bounty☆48Updated 3 years ago
- A collection of common (interesting) cryptographic mistakes and learning resources.☆328Updated 5 months ago
- ☆96Updated 3 years ago
- Explained from First Principles is a technology, science, and philosophy blog for curious people who want to understand and change the wo…☆118Updated 7 months ago