solegga / computer-security-classLinks
Computer Security Class - Department of Informatics and Telecommunications, University of Athens
☆12Updated 8 years ago
Alternatives and similar repositories for computer-security-class
Users that are interested in computer-security-class are comparing it to the libraries listed below
Sorting:
- ☆19Updated 4 years ago
- A design for doing more private Signal groups using anonymous credentials based on algebraic MACs.☆14Updated 5 years ago
- An ENGINE gluing together OpenSSL and NaCl-derived crypto.☆18Updated 2 years ago
- Materials accompanying "Implementing an Elliptic Curve in Go"☆13Updated 7 years ago
- A privacy-preserving digital version of punch cards used in store loyalty programs☆11Updated 4 years ago
- a web page / paper☆18Updated 8 years ago
- ☆20Updated 5 years ago
- C++ library for evaluating arithmetic circuits on batches of inputs☆15Updated 8 years ago
- measure entropy of memory allocators☆12Updated 3 years ago
- Public notes, etc. for CMPSCI 630, the UMass CS graduate systems course.☆21Updated 2 years ago
- A minimal service to detect which cryptocurrency an address corresponds to.☆25Updated 2 years ago
- Parsing library for Tor-specific data formats.☆43Updated last year
- Tor relay nearest neighbour ranking☆10Updated 3 years ago
- like ChaCha, but 64-bit instead of 32-bit thanks to BLAKE2b's permutation☆15Updated 8 years ago
- DeCryKe is a technique to transform almost any cryptographic algorithm into deniable-one, it is a decry of Russia's anti-terrorism law (a…☆23Updated 7 years ago
- ☆9Updated 2 years ago
- FLECC_IN_C is a FLexible Elliptic Curve Cryptography library written IN C☆18Updated 7 years ago
- A simple proof of work, mainly designed to mitigate DDoS attacks.☆25Updated 4 years ago
- A user-first approach to threat modeling.☆17Updated last month
- Results of a recent FOIA for NIST documents related to the design of Dual EC DRBG. Via EFF and Rep. Grayson's office. See README for deta…☆24Updated 10 years ago
- a collection of teaching resources☆12Updated 7 years ago
- Scripts that I used to write a blog post about section 7.24.1(2) of C11☆11Updated 8 years ago
- cgo wrappers around post-quantum cryptography primitives☆23Updated 6 years ago
- Cython wrappers for Google's sparsehash library, and the murmur hash functions☆17Updated 10 years ago
- Pong revolution.☆13Updated 5 years ago
- Basic proof-of-custody library☆7Updated 10 years ago
- Login Area Finder: scans host/s for login panels☆14Updated 10 years ago
- Assignments for the cryptography engineering course☆12Updated 11 years ago
- A fork of floodyberry's ed25519-donna modified to support the Ristretto prime-order group☆14Updated 4 years ago
- A repository for scripts to update and manage a monerodo☆13Updated 7 years ago