oconnor663 / applied_crypto_2021_fallLinks
problem sets for CS-GY 6903 Applied Cryptography
☆41Updated 3 years ago
Alternatives and similar repositories for applied_crypto_2021_fall
Users that are interested in applied_crypto_2021_fall are comparing it to the libraries listed below
Sorting:
- A Fully Homomorphic Encryption Brainfuck virtual machine☆217Updated 5 years ago
- Intuitive Advanced Cryptography☆436Updated 3 years ago
- Intuitive Quantum Computation and Post-Quantum Cryptography☆63Updated 2 years ago
- A collection of common (interesting) cryptographic mistakes and learning resources.☆356Updated 2 months ago
- An animated visualization of elliptic curve cryptography☆146Updated last month
- PUREE: Password-based Uniform-Random-Equivalent Encryption☆64Updated 5 years ago
- Blogs about Cryptography/Security to follow☆46Updated 3 years ago
- OPAQUE protocol, a secure asymmetric password authenticated key exchange (aPAKE) that supports mutual authentication in a client-server s…☆81Updated 4 years ago
- A Rust implementation of the Message Layer Security group messaging protocol☆115Updated 2 years ago
- A Rust library for lattice-based additive homomorphic encryption.☆417Updated last year
- Optimized Binary GCD for Modular Inversion☆46Updated 4 years ago
- Bertie TLS 1.3 Implementation☆125Updated 3 months ago
- Jupyter notebook for explaining elliptic curve encryption☆88Updated 4 years ago
- ☆214Updated 4 years ago
- An exploration to host Wikipedia in IPFS☆175Updated 2 years ago
- A curated list of resources about post-quantum cryptography.☆332Updated last month
- Explained from First Principles is a technology, science, and philosophy blog for curious people who want to understand and change the wo…☆121Updated last month
- ☆28Updated 3 years ago
- Privacy Pass implementation in Rust☆45Updated 2 months ago
- Oblivious Pseudorandom Functions (OPRFs) using Prime-Order Groups☆38Updated last year
- Paper and Demo Implementation of Paradoxical Compression with VDF☆174Updated 3 years ago
- A distributed hash table with unusually strong security properties☆64Updated 5 years ago
- A description of the relationship between databases, collaboration and Kripke☆28Updated 3 years ago
- Constant time big numbers for Go☆104Updated 6 months ago
- A design for doing more private Signal groups using anonymous credentials based on algebraic MACs.☆14Updated 5 years ago
- Please see https://github.com/hacspec/hax☆245Updated last year
- ☆82Updated 5 years ago
- Analysis of Bitcoin's current and future transaction throughput bottlenecks.☆111Updated 4 years ago
- Bounds on divsteps iterations in safegcd☆53Updated 11 months ago
- Mirror of a website on Elligator by Daniel J. Bernstein, Mike Hamburg, Anna Krasnova, and Tanja Lange☆17Updated 5 months ago