Homework exercises from the "Understanding Cryptography" textbook and accompanying lecture series.
☆27Mar 25, 2018Updated 7 years ago
Alternatives and similar repositories for understanding-cryptography-exercises
Users that are interested in understanding-cryptography-exercises are comparing it to the libraries listed below
Sorting:
- This repo contains the code developed for my master thesis☆13Mar 24, 2022Updated 3 years ago
- SQL Server Always Encrypted Key Store Generic Provider for Key Store Interopearibility between Windows and Linux☆11Oct 24, 2018Updated 7 years ago
- ☆13Apr 22, 2024Updated last year
- ☆39Sep 9, 2025Updated 5 months ago
- ☆11Oct 1, 2025Updated 5 months ago
- Secure Inference Resilient Against Malicious Clients☆15May 3, 2022Updated 3 years ago
- aries-acapy-plugins☆10Updated this week
- Post-quantum trusted time-stamping server☆17Dec 11, 2024Updated last year
- Plonky2 implementation of Ed25519☆11Apr 5, 2024Updated last year
- ☆11Dec 23, 2022Updated 3 years ago
- Infinite Cloud bot source code☆15May 10, 2025Updated 9 months ago
- Common MPC Pitfalls☆12Feb 14, 2026Updated 3 weeks ago
- I-D that describes the algorithm identifiers for NIST's PQC ML-DSA for use in the Internet X.509 Public Key Infrastructure☆14Oct 30, 2025Updated 4 months ago
- Matlab code to collect real time data from Contec Pulse Oximeters (Heart rate monitor). Please note, this is unsupported and unofficial c…☆15Mar 25, 2019Updated 6 years ago
- Improved Secure 3-Party Neural Network Inference with Reducing Online Communication Costs☆11Jan 27, 2023Updated 3 years ago
- Paribasa or you can call it as Javanese quotes☆10Jan 6, 2023Updated 3 years ago
- Collection of open-source JavaCard crypto algorithms. Optimized for memory and speed with unified interface☆13Oct 6, 2024Updated last year
- The repo of "Coral: Maliciously Secure Computation Framework for Packed and Mixed Circuits" (CCS 2024)☆12Sep 6, 2024Updated last year
- An ongoing & curated collection of awesome vulnerability scanning software, libraries and frameworks, best guidelines, technical resource…☆14Feb 7, 2022Updated 4 years ago
- Remotely start download tasks from the web to your Synology NAS☆11Aug 31, 2018Updated 7 years ago
- The Codec 2 speech codec, compiled to WASM using Emscripten.☆13Apr 27, 2023Updated 2 years ago
- ☆14Feb 2, 2019Updated 7 years ago
- Bottom-up memory-safety for assembly language using symbolic execution☆17Feb 19, 2026Updated 2 weeks ago
- OpenID4VC Playground for issuing and verifying SD-JWTs and mDOCs.☆13Feb 23, 2026Updated last week
- Elgamal Encryption using Elliptic Curve Cryptography in Python 2.7☆13Nov 17, 2018Updated 7 years ago
- ☆10Jun 13, 2017Updated 8 years ago
- ☆11Mar 20, 2017Updated 8 years ago
- Loadable Module for Keystone Enclave☆19Sep 24, 2022Updated 3 years ago
- A TEE programming framework based on trusted functions.☆14Mar 23, 2021Updated 4 years ago
- Train an autoencoser to detect anomaly from ECG5000 dataset.☆13Dec 4, 2020Updated 5 years ago
- Source code for 'Beginning Ethereum Smart Contracts Programming' by Wei-Meng Lee☆11Nov 22, 2019Updated 6 years ago
- 🌊 A React UI library☆13Feb 2, 2022Updated 4 years ago
- ☆14Feb 25, 2026Updated last week
- Porpoise is a tool to port applications to Intel SGX enclaves.☆10Sep 27, 2021Updated 4 years ago
- PRINCESS source code☆11Oct 15, 2016Updated 9 years ago
- ☆21Sep 18, 2025Updated 5 months ago
- Repository to discuss and track progress of "Future of Build Toolchain" Strategic Initiative☆11Feb 2, 2022Updated 4 years ago
- OCaml implementation of Wake-On-LAN (WOL)☆16Apr 30, 2024Updated last year
- Mock implementation of the Java Card API 3.0.4 in order to test Java Card applet code without a card or simulator.☆15May 6, 2019Updated 6 years ago