oconnor663 / applied_crypto_2021_fallLinks
problem sets for CS-GY 6903 Applied Cryptography
☆41Updated 4 years ago
Alternatives and similar repositories for applied_crypto_2021_fall
Users that are interested in applied_crypto_2021_fall are comparing it to the libraries listed below
Sorting:
- Intuitive Advanced Cryptography☆436Updated 3 years ago
- A Fully Homomorphic Encryption Brainfuck virtual machine☆216Updated 6 years ago
- Bertie TLS 1.3 Implementation☆130Updated 2 months ago
- Explained from First Principles is a technology, science, and philosophy blog for curious people who want to understand and change the wo…☆124Updated 4 months ago
- An animated visualization of elliptic curve cryptography☆152Updated 5 months ago
- A collection of common (interesting) cryptographic mistakes and learning resources.☆364Updated 5 months ago
- PUREE: Password-based Uniform-Random-Equivalent Encryption☆64Updated 5 years ago
- Intuitive Quantum Computation and Post-Quantum Cryptography☆63Updated 3 years ago
- SDK for private data access, built on homomorphic encryption.☆354Updated last year
- Economic and Banking System Simulation Framework.☆30Updated 2 years ago
- Blogs about Cryptography/Security to follow☆46Updated 4 years ago
- The SHA-256 Project, developed for NYU Tandon's Applied Cryptography course☆549Updated 5 months ago
- A Rust library for lattice-based additive homomorphic encryption.☆418Updated 2 years ago
- OPAQUE protocol, a secure asymmetric password authenticated key exchange (aPAKE) that supports mutual authentication in a client-server s…☆84Updated 4 years ago
- ☆214Updated 4 years ago
- A Rust implementation of the Message Layer Security group messaging protocol☆116Updated 2 years ago
- ☆27Updated last year
- Cingulata (pronounced "tchingulata") is a compiler toolchain and RTE for running C++ programs over encrypted data by means of fully homom…☆407Updated 6 months ago
- Source Code Transparency☆11Updated 2 years ago
- ☆28Updated 4 years ago
- Oblivious Pseudorandom Functions (OPRFs) using Prime-Order Groups☆38Updated last year
- Bounds on divsteps iterations in safegcd☆56Updated last year
- MLS architecture☆74Updated 8 months ago
- Jupyter notebook for explaining elliptic curve encryption☆88Updated 4 years ago
- Fish in a Barrel Memory Safety Bounty☆49Updated 4 years ago
- Paper and Demo Implementation of Paradoxical Compression with VDF☆175Updated 3 years ago
- Exploration of NIST post-quantum signatures on-ramp candidates☆37Updated 6 months ago
- SHA256 sentence: discover a SHA256 checksum that matches a sentence's description of hex digit words.☆21Updated 8 months ago
- ☆82Updated 5 years ago
- A distributed hash table with unusually strong security properties☆64Updated 6 years ago