syncsynchalt / animated-curves
An animated visualization of elliptic curve cryptography
☆136Updated 5 months ago
Alternatives and similar repositories for animated-curves:
Users that are interested in animated-curves are comparing it to the libraries listed below
- Jupyter notebook for explaining elliptic curve encryption☆86Updated 3 years ago
- problem sets for CS-GY 6903 Applied Cryptography☆39Updated 3 years ago
- Rust library for cryptographic research☆138Updated last month
- IPv4 address turf war!☆71Updated last year
- Community Cryptography Test Vectors☆71Updated 3 weeks ago
- Community Cryptography Specification Project☆341Updated last week
- Intuitive Advanced Cryptography☆431Updated 2 years ago
- A curated list of resources about post-quantum cryptography☆272Updated 4 months ago
- An Elliptic-Curve Based Secure Chat, written using Rust and Protobuf!☆52Updated 5 months ago
- Constant time big numbers for Go☆96Updated last year
- Deployments of fancy cryptography☆134Updated last month
- The Xr0 Verifier for C☆179Updated this week
- Nyxelf is a highly effective tool tailored for analyzing malicious Linux ELF binaries, offering comprehensive support for both static and…☆104Updated 3 weeks ago
- Research and proof of concept to develop the next SecureDrop with end to end encryption.☆48Updated 2 weeks ago
- A collection of common (interesting) cryptographic mistakes and learning resources.☆330Updated 6 months ago
- Explained from First Principles is a technology, science, and philosophy blog for curious people who want to understand and change the wo…☆119Updated 8 months ago
- SHA256 sentence: discover a SHA256 checksum that matches a sentence's description of hex digit words.☆21Updated last year
- A decentralized social protocol based on git☆130Updated last year
- ✨ rudimentary simulation of the three-body problem☆155Updated 10 months ago
- A proof-of-concept TypeScript TLS 1.3 client☆357Updated last week
- A Python implementation of Garbled Circuits MPC protocol☆56Updated last year
- Simple demo illustrating remanence of data in RAM (see Cold boot attack) using a Raspberry Pi. Loads many images of the Mona Lisa into R…☆102Updated last year
- A dead man's switch for full but responsible disclosure of vulnerabilities☆55Updated 4 months ago
- Intuitive Quantum Computation and Post-Quantum Cryptography☆62Updated 2 years ago
- Cryptanalysis of the Enigma machine in Rust.☆125Updated 3 years ago
- A Course in Cryptanalysis☆136Updated 4 months ago
- Is SIKE broken yet?☆17Updated 2 years ago
- A small, portable, linear probing hash map☆142Updated 2 months ago
- Beating the `bisect` module's implementation using C-extensions.☆30Updated last year
- ☆126Updated last month