syncsynchalt / animated-curves
An animated visualization of elliptic curve cryptography
☆140Updated 7 months ago
Alternatives and similar repositories for animated-curves:
Users that are interested in animated-curves are comparing it to the libraries listed below
- Rust library for cryptographic research☆140Updated 4 months ago
- Bertie TLS 1.3 Implementation☆118Updated this week
- OPAQUE protocol, a secure asymmetric password authenticated key exchange (aPAKE) that supports mutual authentication in a client-server s…☆78Updated 3 years ago
- SHA256 sentence: discover a SHA256 checksum that matches a sentence's description of hex digit words.☆21Updated 2 weeks ago
- Implementation of a drand client in Rust☆26Updated last year
- Jupyter notebook for explaining elliptic curve encryption☆86Updated 4 years ago
- Deployments of fancy cryptography☆139Updated 3 months ago
- A Course in Cryptanalysis☆144Updated 6 months ago
- Community Cryptography Test Vectors☆76Updated 3 months ago
- Constant time big numbers for Go☆101Updated 2 months ago
- An Elliptic-Curve Based Secure Chat, written using Rust and Protobuf!☆52Updated 7 months ago
- Research and proof of concept to develop the next SecureDrop with end to end encryption.☆48Updated this week
- A curated list of resources about post-quantum cryptography☆282Updated 7 months ago
- Timelock Encryption made practical. The Go `tlock` library and the `tle` cmd line tool home to encrypt towards the future.☆539Updated 2 months ago
- Privacy Pass implementation in Rust☆30Updated 5 months ago
- Always up-to-date mirror of the SUPERCOP cryptographic benchmark.☆28Updated 2 weeks ago
- The OPAQUE Asymmetric PAKE Protocol☆104Updated 2 months ago
- Formal Analysis of the PQXDH Protocol☆25Updated 10 months ago
- ☆23Updated 2 years ago
- Rust source code for the FrodoPIR Private Information Retrieval scheme.☆67Updated last year
- The formally verified crypto library for Rust☆119Updated this week
- Optimized Binary GCD for Modular Inversion☆43Updated 4 years ago
- Scripts for the 'Breaking Rainbow takes a Weekend on a Laptop' paper☆81Updated 3 years ago
- Simple demo illustrating remanence of data in RAM (see Cold boot attack) using a Raspberry Pi. Loads many images of the Mona Lisa into R…☆102Updated last year
- Curve ecGFp5☆68Updated 3 years ago
- Implementation of the Covercrypt attributes based encryption algorithm☆17Updated last month
- Mirror of a website on Elligator by Daniel J. Bernstein, Mike Hamburg, Anna Krasnova, and Tanja Lange☆16Updated last month
- A TypeScript library for OPAQUE Asymmetric Password-Authenticated Key Exchange Protocol☆88Updated 6 months ago
- problem sets for CS-GY 6903 Applied Cryptography☆39Updated 3 years ago
- Community Cryptography Specification Project☆366Updated 2 weeks ago