Skip to content

A collection of awesome software, learning tutorials, theoretical resources, books and videos, best practices in applied cryptography.

License

Notifications You must be signed in to change notification settings

paulveillard/cybersecurity-applied-cryptography

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

11 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Applied Cryptography

A collection of awesome software, learning tutorials, theoretical resources, books and videos, best practices in applied cryptography. Thanks to all contributors, you're awesome and wouldn't be possible without you! Our goal is to build a categorized community-driven collection of very well-known resources

Table of Contents

Introduction

The list

Introducing people to data security and cryptography

Simple: cryptography for non-engineers

Brief introductions

General cryptographic interest


Specific topics

Hashing

Secret key cryptography

Cryptanalysis

Public key cryptography: General and DLP

Public key cryptography: Elliptic-curve crypto

Zero Knowledge Proofs

Key Management

Math

  • PRIMES is in P - Unconditional deterministic polynomial-time algorithm that determines whether an input number is prime or composite.

Post-quantum cryptography


Books

That seems somewhat out of scope, isn't it? But these are books only fully available online for free. Read them as a sequence of papers if you will.

Courses

Coding

Misc


Lectures and educational courses


Online crypto challenges

Not exactly papers, but crypto challenges are awesome educational material.

License

MIT License & cc license

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.