sebastianmeiser / CCS-talksLinks
A brief summary of a few talks I attended
☆14Updated 5 years ago
Alternatives and similar repositories for CCS-talks
Users that are interested in CCS-talks are comparing it to the libraries listed below
Sorting:
- Intuitive Quantum Computation and Post-Quantum Cryptography☆63Updated 2 years ago
- Auditing Applied Cryptography☆10Updated 5 years ago
- A privacy-preserving digital version of punch cards used in store loyalty programs☆11Updated 4 years ago
- The anonymous credentials zoo☆16Updated 4 years ago
- ☆18Updated last year
- Malicious Two Party Computation Based on Garbled Circuits.☆12Updated 4 years ago
- Crypto Audit Guidelines☆134Updated 4 years ago
- Google Tink's critical Ed25519 bug related to Java "final" keyword☆11Updated 5 years ago
- Oblivious Pseudorandom Functions (OPRFs) using Prime-Order Groups☆38Updated 10 months ago
- Public repository for Blockchains and Cryptocurrencies (601.641/601.441) JHU (Fall 2020)☆58Updated 4 years ago
- Paillier cryptosystem implemented in Go☆21Updated last year
- Mirror of all PDFs from the IACR's eprint☆47Updated last year
- JHU Advanced Topics in Applied Cryptography (601.745)☆53Updated 7 years ago
- EN.601.741: Advanced Topics in Secure and Censorship-Resistant Communications☆15Updated 4 years ago
- The secure messaging summit information☆20Updated 4 years ago
- Parses https://eprint.iacr.org/eprint-bin/search.pl?last=365&title=1 and sends you an email with the latest papers☆15Updated 4 years ago
- Models for authenticated key exchange in Tamarin☆12Updated 5 years ago
- Pixel: Forward secure multi-signatures and threshold signatures☆17Updated 3 years ago
- Differential fuzzing for elliptic curves☆23Updated last year
- Implementation of cryptographic primitives in Go☆13Updated 2 years ago
- Solutions for the Matasano Crypto Challenges☆23Updated 6 years ago
- Stronger and Faster Side-Channel Protections for CSIDH☆19Updated 4 years ago
- ☆170Updated 4 years ago
- Code for zero-knowledge middleboxes☆63Updated 2 years ago
- Implements a prototype and interactive simulation for the sharded pos ethereum 2.0.☆12Updated 6 years ago
- Static analysis framework for EVM bytecode☆30Updated 5 years ago
- My most recent teaching materials for 2017-2020 courses (50.574, 50.520, 51.502, 50.037).☆29Updated 5 years ago
- Audit Proposals and Reports for RandomX☆12Updated 5 years ago
- Blogs about Cryptography/Security to follow☆46Updated 3 years ago
- ☆139Updated 2 months ago