oconnor663 / applied_crypto_2021_fallLinks
problem sets for CS-GY 6903 Applied Cryptography
☆41Updated 3 years ago
Alternatives and similar repositories for applied_crypto_2021_fall
Users that are interested in applied_crypto_2021_fall are comparing it to the libraries listed below
Sorting:
- A Fully Homomorphic Encryption Brainfuck virtual machine☆217Updated 5 years ago
- Intuitive Advanced Cryptography☆436Updated 3 years ago
- A collection of common (interesting) cryptographic mistakes and learning resources.☆353Updated last month
- Flexible and Constant Time Programming Language☆201Updated 3 years ago
- Explained from First Principles is a technology, science, and philosophy blog for curious people who want to understand and change the wo…☆121Updated 2 weeks ago
- OPAQUE protocol, a secure asymmetric password authenticated key exchange (aPAKE) that supports mutual authentication in a client-server s…☆79Updated 4 years ago
- An animated visualization of elliptic curve cryptography☆145Updated last month
- PUREE: Password-based Uniform-Random-Equivalent Encryption☆64Updated 5 years ago
- A Rust library for lattice-based additive homomorphic encryption.☆417Updated last year
- Fish in a Barrel Memory Safety Bounty☆48Updated 4 years ago
- Cingulata (pronounced "tchingulata") is a compiler toolchain and RTE for running C++ programs over encrypted data by means of fully homom…☆407Updated 2 months ago
- A Rust implementation of the Message Layer Security group messaging protocol☆115Updated 2 years ago
- Intuitive Quantum Computation and Post-Quantum Cryptography☆63Updated 2 years ago
- A curated list of resources about post-quantum cryptography.☆330Updated last week
- Economic and Banking System Simulation Framework.☆28Updated last year
- ☆214Updated 4 years ago
- Decentralize your secrets!☆117Updated 5 years ago
- SDK for private data access, built on homomorphic encryption.☆351Updated last year
- Jupyter notebook for explaining elliptic curve encryption☆88Updated 4 years ago
- Blogs about Cryptography/Security to follow☆46Updated 3 years ago
- Please see https://github.com/hacspec/hax☆244Updated last year
- Deployments of fancy cryptography☆152Updated last month
- The BLAKE3 paper: specifications, analysis, and design rationale☆182Updated 3 years ago
- A FOSS hackers guide to the CLI, privacy, security, self hosting, and the internet.☆71Updated 2 years ago
- A distributed hash table with unusually strong security properties☆64Updated 5 years ago
- Bounds on divsteps iterations in safegcd☆53Updated 10 months ago
- Infinitely presentable (aeon) rerandomisable (flux) anonymous credentials.☆28Updated 4 years ago
- Cryptanalysis of the Enigma machine in Rust.☆125Updated 4 years ago
- Analysis of Bitcoin's current and future transaction throughput bottlenecks.☆111Updated 4 years ago
- SoniControl - the first ultrasonic firewall☆93Updated 2 years ago