All Projects → claucece → Useful Crypto Resources

claucece / Useful Crypto Resources

Licence: mit
A place for useful crypto-related resources plus some of my fav stuff

Projects that are alternatives of or similar to Useful Crypto Resources

Practical Cryptography For Developers Book
Practical Cryptography for Developers: Hashes, MAC, Key Derivation, DHKE, Symmetric and Asymmetric Ciphers, Public Key Cryptosystems, RSA, Elliptic Curves, ECC, secp256k1, ECDH, ECIES, Digital Signatures, ECDSA, EdDSA
Stars: ✭ 2,400 (+1732.06%)
Mutual labels:  cryptography, elliptic-curves
Bulletproofs
Bulletproofs are short non-interactive zero-knowledge proofs that require no trusted setup
Stars: ✭ 458 (+249.62%)
Mutual labels:  cryptography, elliptic-curves
Fastecdsa
Python library for fast elliptic curve crypto
Stars: ✭ 158 (+20.61%)
Mutual labels:  cryptography, elliptic-curves
Curv
Rust language general purpose elliptic curve cryptography.
Stars: ✭ 138 (+5.34%)
Mutual labels:  cryptography, elliptic-curves
Constantine
Constant time pairing-based or elliptic curve based cryptography and digital signatures
Stars: ✭ 61 (-53.44%)
Mutual labels:  cryptography, elliptic-curves
tweedle
Generator and supporting evidence for security of the Tweedledum/Tweedledee pair of elliptic curves suitable for Halo
Stars: ✭ 16 (-87.79%)
Mutual labels:  cryptography, elliptic-curves
Wickr Crypto C
An implementation of the Wickr Secure Messaging Protocol in C
Stars: ✭ 279 (+112.98%)
Mutual labels:  cryptography, elliptic-curves
Curve25519 Dalek
A pure-Rust implementation of group operations on Ristretto and Curve25519
Stars: ✭ 477 (+264.12%)
Mutual labels:  cryptography, elliptic-curves
Swift Crypto
Open-source implementation of a substantial portion of the API of Apple CryptoKit suitable for use on Linux platforms.
Stars: ✭ 1,005 (+667.18%)
Mutual labels:  cryptography, elliptic-curves
X25519
Public key cryptography library for Ruby providing the X25519 Diffie-Hellman function
Stars: ✭ 37 (-71.76%)
Mutual labels:  cryptography, elliptic-curves
Bitcoin Cryptography Library
Nayuki's implementation of cryptographic primitives used in Bitcoin.
Stars: ✭ 81 (-38.17%)
Mutual labels:  cryptography, elliptic-curves
Gurvy
gurvy implements Elliptic Curve Cryptography (+Pairing) for BLS12-381, BLS12-377, BW6-761, and BN256. Originally developed (and used) by gnark
Stars: ✭ 66 (-49.62%)
Mutual labels:  cryptography, elliptic-curves
Gcp Iot Core Examples
Google Cloud Platform IOT Core Examples
Stars: ✭ 103 (-21.37%)
Mutual labels:  cryptography, elliptic-curves
Chest
Bash glue to encrypt and hide files
Stars: ✭ 123 (-6.11%)
Mutual labels:  cryptography
Cryptolib4pascal
Crypto for Modern Object Pascal
Stars: ✭ 127 (-3.05%)
Mutual labels:  cryptography
Chromium Gost
Chromium с поддержкой алгоритмов ГОСТ
Stars: ✭ 123 (-6.11%)
Mutual labels:  cryptography
Endesive
en-crypt, de-crypt, si-gn, ve-rify - smime, pdf, xades and plain files in pure python
Stars: ✭ 122 (-6.87%)
Mutual labels:  cryptography
Libsodium Doc
Gitbook documentation for libsodium
Stars: ✭ 129 (-1.53%)
Mutual labels:  cryptography
Feathercoin
Stars: ✭ 126 (-3.82%)
Mutual labels:  cryptography
Pycryptodome
A self-contained cryptographic library for Python
Stars: ✭ 1,817 (+1287.02%)
Mutual labels:  cryptography

Useful Crypto-related Resources

This repository contains resources that I considered useful. It is a personal repository.

General

Authenticated Encryption

AKE

Network Protocols

TLS

X509/ASN.1

OTR

OTRv2

OTRv3

Multiparty

Usability

Signal Protocol

Zero Knowledge Proof

Ciphers

Stream cipher

Nonce

AES

Salsa 20

XSalsa20

ChaCha20

Analysis of Salsa, ChaCha and Rumba

Blockcipher

In general

Symmetric key algorithm

DES

Key Exchange

Theory

With Anonymous Authentication

Degenerate

Fault Attacks

Diffie Hellman

Validation

Attacks

Cramer-Shoup

ElGamal

Dual Receiver Encryption

Elliptic Curve

Theory

Encoding

Twist

Jacobic

Kummer varieties

In general

Courses

Conversions

wNafs

Ideas

EC255219

Edwards Curve

X448

Theory

Encoding

ed448

elligator

ed225519

Attacks

BenchMarking

extra

Hash Functions

Key generation function

Random Number Generators

Message Authentification Code (MAC)

Key derivation functions

Digital Signatures

Schnorr signatures

Hash-based signatures

EdDSA

XEdDSA

qDSA

Zero-Knowledge

Validations

Models

The Random Oracle Model

Formal Verifications

Mix networks

Anonimity

Protocol

Sociallist Millionaire Protocol (SMP)

Double Ratchet

STROBE

[The OAKLEY Key Determination Protocol]

Schemes

Security

Compendia

School

Library

Pairing-based cryptography

Nik Unger otr implementation

General

Javascript

CIRCL

Quatum computing

Post-Quantum Cryptography

Hashed-based signatures

Searchable symmetric encryption

Malware

MPC

Passwords

Cryptocurrencies

Bitcoin

Usability

Mailing List

Hacking (in general)

Various

Password managers

VPRFs / (V)OPRFs

Post-quantum Cryptography and protocols

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].