solegga / computer-security-classLinks
Computer Security Class - Department of Informatics and Telecommunications, University of Athens
☆12Updated 8 years ago
Alternatives and similar repositories for computer-security-class
Users that are interested in computer-security-class are comparing it to the libraries listed below
Sorting:
- ☆19Updated 5 years ago
- ☆9Updated 2 years ago
- C++ library for evaluating arithmetic circuits on batches of inputs☆15Updated 8 years ago
- Public notes, etc. for CMPSCI 630, the UMass CS graduate systems course.☆21Updated 2 years ago
- A repository for scripts to update and manage a monerodo☆13Updated 7 years ago
- A design for doing more private Signal groups using anonymous credentials based on algebraic MACs.☆14Updated 5 years ago
- measure entropy of memory allocators☆12Updated 3 years ago
- How fast can we brute force a 64-bit comparison?☆52Updated 5 years ago
- Results of a recent FOIA for NIST documents related to the design of Dual EC DRBG. Via EFF and Rep. Grayson's office. See README for deta…☆24Updated 10 years ago
- ☆10Updated 3 years ago
- a web page / paper☆18Updated 8 years ago
- Implementation of Shamir's secret sharing in C++11☆9Updated 10 years ago
- cgo wrappers around post-quantum cryptography primitives☆23Updated 6 years ago
- A fork of floodyberry's ed25519-donna modified to support the Ristretto prime-order group☆14Updated 4 years ago
- ☆18Updated last year
- Differential fuzzing for elliptic curves☆23Updated last year
- FLECC_IN_C is a FLexible Elliptic Curve Cryptography library written IN C☆18Updated 7 years ago
- Mirror of all PDFs from the IACR's eprint☆47Updated last year
- Materials accompanying "Implementing an Elliptic Curve in Go"☆13Updated 7 years ago
- Signature scheme submitted to NIST's Post-Quantum Cryptography Project☆28Updated 7 years ago
- A privacy-preserving digital version of punch cards used in store loyalty programs☆11Updated 4 years ago
- Structural (non-cryptographic) Python implementation of the Avalanche algorithm by TeamRocket☆15Updated 7 years ago
- High Speed elliptic curve signature system using a 260-bit Granger Moss Prime.☆14Updated 4 years ago
- Experimental operating system for deterministic parallel computing☆38Updated 10 years ago
- A simple proof of work, mainly designed to mitigate DDoS attacks.☆25Updated 4 years ago
- An ENGINE gluing together OpenSSL and NaCl-derived crypto.☆18Updated 2 years ago
- ☆23Updated 5 years ago
- Basic proof-of-custody library☆7Updated 10 years ago
- Anonymous messaging using mix networks☆45Updated 5 years ago
- EN.601.741: Advanced Topics in Secure and Censorship-Resistant Communications☆15Updated 4 years ago