paulveillard / cybersecurity-applied-cryptography

A collection of awesome software, learning tutorials, theoretical resources, books and videos, best practices in applied cryptography.

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

Applied Cryptography

A collection of awesome software, learning tutorials, theoretical resources, books and videos, best practices in applied cryptography. Thanks to all contributors, you're awesome and wouldn't be possible without you! Our goal is to build a categorized community-driven collection of very well-known resources

Table of Contents

Introduction

The list

Introducing people to data security and cryptography

Simple: cryptography for non-engineers

Brief introductions

General cryptographic interest


Specific topics

Hashing

Secret key cryptography

Cryptanalysis

Public key cryptography: General and DLP

Public key cryptography: Elliptic-curve crypto

Zero Knowledge Proofs

Key Management

Math

  • PRIMES is in P - Unconditional deterministic polynomial-time algorithm that determines whether an input number is prime or composite.

Post-quantum cryptography


Books

That seems somewhat out of scope, isn't it? But these are books only fully available online for free. Read them as a sequence of papers if you will.

Courses

Coding

Misc


Lectures and educational courses


Online crypto challenges

Not exactly papers, but crypto challenges are awesome educational material.

License

MIT License & cc license

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.

About

A collection of awesome software, learning tutorials, theoretical resources, books and videos, best practices in applied cryptography.

License:MIT License