tecnico-sec / Java-Crypto-DetailsLinks
Java Cryptographic Details Laboratory Guide
☆11Updated 2 months ago
Alternatives and similar repositories for Java-Crypto-Details
Users that are interested in Java-Crypto-Details are comparing it to the libraries listed below
Sorting:
- Intuitive Quantum Computation and Post-Quantum Cryptography☆63Updated 3 years ago
- Crypto Audit Guidelines☆134Updated 5 years ago
- Tool for generating Elliptic curve domain parameters☆130Updated 2 months ago
- A community driven resource for learning CryptoGraphy☆70Updated 2 years ago
- Rust library for isogeny-based cryptography☆20Updated last month
- A Course in Cryptanalysis☆149Updated last year
- SageMath/Python Toolkit for Cryptanalytic Research☆41Updated 8 months ago
- Design and Cryptanalysis of Symmetric-Key Algorithms in Black and White-box Models☆26Updated last year
- JHU Advanced Topics in Applied Cryptography (601.745)☆53Updated 7 years ago
- A repository that aims to provide tools for cryptography and cryptanalysis☆218Updated 5 years ago
- Slides from our technical talks☆29Updated 4 months ago
- Cryptography & CTF Writeups☆83Updated 2 years ago
- Scripts for the 'Breaking Rainbow takes a Weekend on a Laptop' paper☆84Updated 3 years ago
- ☆145Updated 9 months ago
- Trail of Bits Testing Handbook - appsec.guide☆92Updated last week
- List of crackpot 'scientists' and 'thinkers'☆20Updated 7 months ago
- SageMath library for constructing elliptic curves☆74Updated 2 years ago
- A SageMath implementation of the Castryck-Decru Key Recovery attack on SIDH☆138Updated 2 years ago
- ☆68Updated 5 years ago
- A collection of Bristol format circuit files☆13Updated 3 years ago
- General tips and advice for becoming interested in research, finding a suitable topic, and setting goals.☆28Updated 4 years ago
- Hashing to Elliptic Curves☆80Updated last year
- An easy to use tool for cryptanalysis of symmetric primitives based on SMT/SAT solvers.☆103Updated 2 years ago
- ☆24Updated 3 years ago
- ☆238Updated last year
- PoC for our attacks on MEGA.☆29Updated 3 years ago
- A collection of common (interesting) cryptographic mistakes and learning resources.☆366Updated 7 months ago
- Automated cryptanalysis of substitution permutation network cipher☆32Updated last year
- Some writeups for some CTFs☆18Updated last year
- ☆156Updated 5 months ago