Bintou (lbwang)

lbwang

Geek Repo

Company:SCNU-CS

Github PK Tool:Github PK Tool

Bintou's repositories

CINTA-cn

一本数论、代数与算法的入门讲义.

Lattice-based-AKE

A new lattice-based authenticated key exchange protocol.

Language:TeXStargazers:1Issues:3Issues:0

2SIDH-Extended-Adaptive-Attack

MAGMA code demonstrating the Extended Adaptive Attack on 2-SIDH

Language:MATLABLicense:MITStargazers:0Issues:1Issues:0

awesome-hacking

A curated list of awesome Hacking tutorials, tools and resources

License:MITStargazers:0Issues:1Issues:0

Diffie-Hellman_Backdoor

How to backdoor Diffie-Hellman

Language:PythonStargazers:0Issues:1Issues:0

DSA

Python implementation of the Digital Signature Algorithm

Language:PythonStargazers:0Issues:2Issues:0

ema2017

École Mathématique Africaine 2017 – Lecture notes for Isogeny-based cryptography

Language:TeXLicense:NOASSERTIONStargazers:0Issues:1Issues:0

HElib

An Implementation of homomorphic encryption

Language:C++Stargazers:0Issues:2Issues:0

joeecc

Elliptic Curve Cryptography playground/toolkit written in pure Python

Language:PythonLicense:GPL-3.0Stargazers:0Issues:2Issues:0

keccak-tiny

A tiny implementation of SHA-3, SHAKE, Keccak, and sha3sum

Language:CStargazers:0Issues:2Issues:0

liboqs

C library for quantum-resistant cryptographic algorithms.

Language:CLicense:NOASSERTIONStargazers:0Issues:2Issues:0

libsnark

C++ library for zkSNARKs

Language:C++License:NOASSERTIONStargazers:0Issues:1Issues:0

Lol

A library for ring-based lattice cryptography

Language:HaskellStargazers:0Issues:2Issues:0

lwe-frodo

Post-quantum key exchange from the learning with errors problem — from the paper "Frodo: Take off the ring! Practical, Quantum-Secure Key Exchange from LWE", published in ACM CCS 2016, https://eprint.iacr.org/2016/659

Language:CLicense:NOASSERTIONStargazers:0Issues:2Issues:0

pairings.py

Elliptic curve pairing in Python

Language:PythonLicense:BSD-2-ClauseStargazers:0Issues:1Issues:0

PQC-AKE

:fire: Lattice-Based Post-Quantum Authenticated Key Exchange

Language:C++Stargazers:0Issues:1Issues:0

PQCrypto-SIDH

SIDH Library is a fast and portable software library that implements state-of-the-art supersingular isogeny cryptographic schemes. The chosen parameters aim to provide security against attackers running a large-scale quantum computer, and security against classical algorithms.

Language:CLicense:MITStargazers:0Issues:1Issues:0

pydsa

DSA Signature Algorithm - A simple implementation in Python

Language:PythonLicense:MITStargazers:0Issues:2Issues:0

reversecore

《逆向工程核心原理》代码及案例

Language:C++Stargazers:0Issues:1Issues:0
Language:CLicense:NOASSERTIONStargazers:0Issues:2Issues:0

RSA-and-LLL-attacks

attacking RSA via lattice reductions (LLL)

Language:TeXStargazers:0Issues:2Issues:0

RsaCtfTool

RSA attack tool (mainly for ctf) - retreive private key from weak public key and/or uncipher data

Language:PythonStargazers:0Issues:2Issues:0

SchnorrGate

Testing Schnorr's factorization claim in Sage

Language:SageStargazers:0Issues:1Issues:0

SCNU_BeamerTemplate

华南师范大学Beamer模板

Language:TeXStargazers:0Issues:1Issues:0

sicp-pdf

SICP PDF with Texinfo and LaTeX source

Language:PerlStargazers:0Issues:2Issues:0

sidh-sage-reference

SAGE reference implementation

Language:PythonLicense:GPL-3.0Stargazers:0Issues:1Issues:0

tiny_sha3

Very small, readable implementation of the SHA3 hash function.

Language:CLicense:MITStargazers:0Issues:2Issues:0