pszal / teachingLinks
My most recent teaching materials for 2017-2020 courses (50.574, 50.520, 51.502, 50.037).
☆29Updated 5 years ago
Alternatives and similar repositories for teaching
Users that are interested in teaching are comparing it to the libraries listed below
Sorting:
- ☆235Updated 10 months ago
- Intuitive Quantum Computation and Post-Quantum Cryptography☆63Updated 3 years ago
- Fastgcd is a C implementation of an efficient algorithm to compute the pairwise GCDs of a collection of integers. The algorithm is due to…☆17Updated last year
- The Scyther Tool for the symbolic analysis of security protocols☆106Updated 2 months ago
- Zigator: A security analysis tool for Zigbee and Thread networks☆33Updated 2 years ago
- Teaching materials related to the Tamarin Prover☆71Updated last year
- Blogs about Cryptography/Security to follow☆46Updated 4 years ago
- MiniCPS: a framework for Cyber-Physical Systems real-time simulation, built on top of mininet☆183Updated 2 months ago
- OWASP IoT Security Verification Standard (ISVS)☆146Updated last month
- Open source release of challenges and other code used in the 2020 Hack-a-Sat Final.☆85Updated 5 years ago
- Datasets and code for IMC'19 paper on information exposure from IoT devices☆67Updated last year
- Sample implementations of the attacks shown in https://eprint.iacr.org/2020/1456☆21Updated 3 years ago
- ☆144Updated 7 months ago
- Go Trusted Execution Environment (TEE)☆139Updated 3 months ago
- Implementation of the key recovery attack against GEA-1 keys (Eurocrypt 2021)☆49Updated 4 years ago
- Embedded AppSec Best Practices☆43Updated last month
- Crypto Audit Guidelines☆134Updated 4 years ago
- Post-quantum cryptography certificates☆74Updated 2 weeks ago
- Solutions for the Matasano Crypto Challenges☆24Updated 7 years ago
- ☆30Updated last month
- This is my personal (big) recopilation about cryptanalysis, crypto tools and challenges☆78Updated last year
- Security Project☆99Updated last week
- SIde-Channel Analysis toolKit: embedded security evaluation tools☆30Updated 3 years ago
- ☆152Updated 2 months ago
- problem sets for CS-GY 6903 Applied Cryptography☆40Updated 3 years ago
- Differential Address Trace Analysis☆60Updated last year
- ☆12Updated 2 months ago
- Trusted Computing based services supporting TPM provisioning and supply chain validation concepts. #nsacyber☆202Updated this week
- A tool for characterizing the network behavior of IoT Devices. The primary intended use is to assist in the generation of allowlist files…☆25Updated 4 months ago
- QEMU setup for emulating satellite firmware for Hack-A-Sat final event☆93Updated 3 years ago