tombusby / understanding-cryptography-exercises
Homework exercises from the "Understanding Cryptography" textbook and accompanying lecture series.
☆24Updated 7 years ago
Alternatives and similar repositories for understanding-cryptography-exercises:
Users that are interested in understanding-cryptography-exercises are comparing it to the libraries listed below
- An ongoing & curated collection of awesome vulnerability scanning software, libraries and frameworks, best guidelines, technical resource…☆13Updated 3 years ago
- CS 5830: Cryptography☆15Updated 7 years ago
- Simple Python Ring-Learning With Errors Key Exchange☆17Updated 7 years ago
- A Github repository I created while studying the Software Security course on Coursera. I made the repository public to discuss solutions …☆40Updated 3 years ago
- Experimental implementation of KEMTLS in Rustls☆30Updated last year
- A collection of awesome software, libraries, documents, books, resources and cool stuff about cryptography in Cybersecurity.☆19Updated last year
- "One must acknowledge with cryptography no amount of violence will ever solve a math problem." ― Jacob Appelbaum☆54Updated 5 years ago
- Implementation of PBFT in node.js☆22Updated 2 years ago
- This is my personal (big) recopilation about cryptanalysis, crypto tools and challenges☆76Updated last year
- Red Team Roadmap [defination, job positions, skills, tools]☆56Updated last year
- نمونه سوالات و پاسخ های مصاحبه تست نفوذ برنامه های موبایل☆13Updated last year
- A first look at browser-based Cryptojacking☆16Updated 6 years ago
- library providing OPRF and Threshold OPRF based on libsodium☆22Updated last week
- MLKEM implementation optimized for embedded microcontrollers☆16Updated 7 months ago
- Awesome list of AI for cybersecurity including network (network traffic analysis and intrusion detection), endpoint (anti-malware), appli…☆130Updated last year
- Arcaptcha library implementation in Golang to validate captcha.☆11Updated 2 years ago
- The Privacy Adversarial Framework (PAF) is a knowledge base of privacy-focused adversarial tactics and techniques. PAF is heavily inspire…☆56Updated last year
- A decentralized privacy-preserving data sharing tool☆31Updated 3 years ago
- A vulnerable RESTful application written in Node and React based on OWASP API security top 10 2023 edition.☆51Updated last year
- Blockchain server, mining server and proof-of-work, python power☆13Updated 5 years ago
- wolfSSL Intrusion Detection and Prevention System (IDPS)☆33Updated last month
- Flower framework for Federated Learning, with Fully Homomorphic Encryption integrated☆12Updated 10 months ago
- Penetration Testing Interview Questions☆36Updated 2 years ago
- (new released v2.5 LTS.2022-06-25) It has focused on developing an All in One operating system for programming, designing and data scienc…☆64Updated 11 months ago
- Lean cryptographic library usable for bare-metal environments☆41Updated last week
- Python for Security and Networking, Published by Packt☆73Updated last year
- TinyGarble: Logic Synthesis and Sequential Descriptions for Yao's Garbled Circuits☆120Updated last year
- Repository for the SoK paper on Fully Homomorphic Encryption (FHE) compilers.☆78Updated 2 years ago
- Raspbian with OP-TEE support.☆26Updated 6 years ago
- A Machine Learning Model to classify samples as XSS (Cross Site-Scrtpting)☆29Updated last year