syncsynchalt / animated-curves
An animated visualization of elliptic curve cryptography
☆129Updated 2 months ago
Related projects ⓘ
Alternatives and complementary repositories for animated-curves
- Bertie TLS 1.3 Implementation☆112Updated this week
- OPAQUE protocol, a secure asymmetric password authenticated key exchange (aPAKE) that supports mutual authentication in a client-server s…☆74Updated 3 years ago
- Jupyter notebook for explaining elliptic curve encryption☆86Updated 3 years ago
- SHA256 sentence: discover a SHA256 checksum that matches a sentence's description of hex digit words.☆21Updated last year
- Deployments of fancy cryptography☆125Updated 3 weeks ago
- Research and proof of concept to develop the next SecureDrop with end to end encryption.☆47Updated 4 months ago
- An Elliptic-Curve Based Secure Chat, written using Rust and Protobuf!☆52Updated 2 months ago
- Community Cryptography Specification Project☆313Updated last month
- Simple demo illustrating remanence of data in RAM (see Cold boot attack) using a Raspberry Pi. Loads many images of the Mona Lisa into R…☆101Updated 9 months ago
- Community Cryptography Test Vectors☆64Updated 3 weeks ago
- Rust library for cryptographic research☆134Updated 5 months ago
- A dead man's switch for full but responsible disclosure of vulnerabilities☆55Updated last month
- problem sets for CS-GY 6903 Applied Cryptography☆39Updated 2 years ago
- ✨ rudimentary simulation of the three-body problem☆152Updated 7 months ago
- Battery info program for x86-64 Linux laptops in 384 bytes of machine code☆59Updated 5 months ago
- Constant time big numbers for Go☆97Updated 9 months ago
- IPv4 address turf war!☆71Updated last year
- A distributed hash table with unusually strong security properties☆64Updated 4 years ago
- A curated list of resources about post-quantum cryptography☆253Updated last month
- Rust source code for the FrodoPIR Private Information Retrieval scheme.☆60Updated 10 months ago
- Explained from First Principles is a technology, science, and philosophy blog for curious people who want to understand and change the wo…☆117Updated 5 months ago
- A CPU-friendly client puzzle with instant verification☆105Updated 4 years ago
- Beating the `bisect` module's implementation using C-extensions.☆30Updated last year
- ☆22Updated 2 years ago
- Spawn shells anywhere. Fully peer-to-peer, authenticated, and end to end encrypted☆246Updated 8 months ago
- SBP: A Programming Paradigm for Building Secure Software and Operating Systems☆28Updated 6 months ago
- Please see https://github.com/hacspec/hax☆243Updated 9 months ago
- 🥊 Components to measure Direct Connection Upgrade through Relay (DCUtR) performance.