yuchen1024 / yuchen1024.github.io
homepage
☆9Updated last week
Alternatives and similar repositories for yuchen1024.github.io:
Users that are interested in yuchen1024.github.io are comparing it to the libraries listed below
- ☆36Updated 2 years ago
- ☆60Updated last week
- A C++ library containing both easy-to-use lower level bigint/ecgroup interfaces and high-level cryptographical schemes/protocols.☆76Updated 6 months ago
- ☆17Updated last year
- ☆13Updated 2 years ago
- 全国密码技术竞赛论文 latex模板☆10Updated 2 years ago
- Maintain a list of open source libraries of cryptographic excellence☆59Updated last year
- implementation of seren☆12Updated last month
- Assignments of Cyber Security of Xidian University,西电网信院信安课程实验与大作业☆16Updated 3 years ago
- A page containing many useful links.☆25Updated 4 months ago
- 初学者怎样学习密码学Cryptography☆93Updated 2 years ago
- ☆32Updated 2 months ago
- 华中科技大学软件安全课程设计作品设计一等奖☆16Updated last year
- Code repository for the paper at USENIX Security'24☆25Updated 5 months ago
- This repo collects the best papers from top 4 computer security conferences, including IEEE S&P, ACM CCS, USENIX Security, and NDSS.☆71Updated 6 months ago
- ☆11Updated 9 months ago
- This is a GIT syncronization of https://wiki.newae.com☆10Updated 6 years ago
- 可信计算实验☆11Updated 3 years ago
- ☆28Updated last year
- Verifiable Forward Secure SSE scheme☆10Updated 4 years ago
- Artifacts for our USENIX Security '24 paper: "Code is not Natural Language: Unlock the Power of Semantics-Oriented Graph Representation f…☆62Updated last month
- ☆14Updated 10 months ago
- 华中科技大学网安学院的一个开源软件项目。☆17Updated last month
- Statistics of acceptance rate for the top conferences: Oakland, CCS, USENIX Security, NDSS.☆129Updated 3 months ago
- Curated list of classic fuzzing books, papers about fuzzing at information security top conferences over the years, commonly used fuzzing…☆331Updated 2 weeks ago
- A curated list of Security Big4 papers for Privacy, Mobile Security and Access Control.☆10Updated 3 months ago
- Academic Papers about LLM Application on Security☆115Updated 7 months ago
- SHERLOC: Secure and Holistic Control-Flow Violation Detection on Embedded Systems☆16Updated 11 months ago
- 一款国产化轻量级S盒的密码学性质检测⼯具☆17Updated 10 months ago
- 信息安全数学基础-陈恭亮-WHU教案习题解答☆50Updated 3 years ago