solegga / computer-security-class
Computer Security Class - Department of Informatics and Telecommunications, University of Athens
☆12Updated 8 years ago
Alternatives and similar repositories for computer-security-class:
Users that are interested in computer-security-class are comparing it to the libraries listed below
- A design for doing more private Signal groups using anonymous credentials based on algebraic MACs.☆14Updated 5 years ago
- Materials accompanying "Implementing an Elliptic Curve in Go"☆13Updated 7 years ago
- A set of templates for different academic venues.☆27Updated 5 years ago
- FLECC_IN_C is a FLexible Elliptic Curve Cryptography library written IN C☆18Updated 7 years ago
- measure entropy of memory allocators☆12Updated 3 years ago
- ☆19Updated 4 years ago
- ☆20Updated 5 years ago
- Cython wrappers for Google's sparsehash library, and the murmur hash functions☆17Updated 10 years ago
- Sort-of GNU C99 Declaration Parser☆11Updated 5 years ago
- Differential fuzzing for elliptic curves☆23Updated last year
- Tor relay nearest neighbour ranking☆10Updated 3 years ago
- Mirror of all PDFs from the IACR's eprint☆46Updated last year
- A minimal service to detect which cryptocurrency an address corresponds to.☆27Updated 2 years ago
- Results of a recent FOIA for NIST documents related to the design of Dual EC DRBG. Via EFF and Rep. Grayson's office. See README for deta…☆24Updated 10 years ago
- Assignments for the cryptography engineering course☆12Updated 11 years ago
- A privacy-preserving digital version of punch cards used in store loyalty programs☆10Updated 3 years ago
- An ENGINE gluing together OpenSSL and NaCl-derived crypto.☆18Updated last year
- Quick experiment to see how expensive safety is in C, for research☆12Updated 5 years ago
- ☆21Updated 10 years ago
- C++ library for evaluating arithmetic circuits on batches of inputs☆15Updated 8 years ago
- Alternative hexdump.☆15Updated 9 years ago
- a web page / paper☆18Updated 8 years ago
- Implementation of Shamir's secret sharing in C++11☆9Updated 10 years ago
- How fast can we brute force a 64-bit comparison?☆52Updated 5 years ago
- Modified version of Tor and associated tools for investigating the Hidden Service DHT. This research is old. Lots of work is being done t…☆11Updated 9 years ago
- A Simple Network Stream Recorder☆35Updated 6 years ago
- DeCryKe is a technique to transform almost any cryptographic algorithm into deniable-one, it is a decry of Russia's anti-terrorism law (a…☆23Updated 7 years ago
- LibreSSL with a backdoor in RSA key generation☆16Updated 8 years ago
- Timing Attack on TLS' ECDSA signature☆42Updated 9 years ago
- ☆12Updated 4 years ago