(Still exploring) My cryptography journey: A collection of notebooks covering different algorithms and concepts from cryptography
-
Updated
Jul 6, 2023 - Jupyter Notebook
Cryptography, or cryptology is the practice and study of techniques for secure communication in the presence of adversarial behavior. More generally, cryptography is about constructing and analyzing protocols that prevent third parties or the public from reading private messages.
(Still exploring) My cryptography journey: A collection of notebooks covering different algorithms and concepts from cryptography
SageMath notebooks for Isogeny Graphs in Cryptography
Cryptography Notebook is a repository containing some of the cryptographic implementations I have done for learning purposes.
All my jupyter notebooks used to learn Cryptography, Mathematics, Security and Machine Learning.
A collection of IPython Notebooks for various purposes.
notebook with advanced functionality (financial assistant, diary, notes, plans, calendar, photo gallery, notes about your surroundings). Implemented encryption protection. Data is stored on Google Drive.
This repository contains the materials, python codes for the quiz and some codes implemented using jupyter notebook related to the specialization ( Introduction to Discrete Mathematics In Computer Science)
An exploration of the Genesis in a computational notebook environment.
"Solving an alchemical cipher in a shared notebook of John and Arthur Dee"
Mostly jupyter notebooks with exercises for cryptography course.
2021 COM-401 course's at EPFL, coding homeworks. Sage kernel for Jupyter Notebook. Cryptography and Security.
Notebooks to poke around the blockchain for codebreaker 2018 challenge walkthrough
🔐 Fernet guarantees that a message encrypted using it cannot be manipulated or read without the key. Fernet is an implementation of symmetric (also known as “secret key”) authenticated cryptography.
Merkle Note is a lightweight GTK-based application for securely encrypting, decrypting, and saving textual data. The application uses AES-256-CBC encryption and integrates a Merkle root system for verifying the integrity of the stored data.
👨💻 🔐 📈 A project based in (Classical) Post-Quantum Cryptography, namely in Lattice-Based Cryptography. This project was built using Jupyter Notebook, SoS (Script of Script) Notebook, Java, Python, Bouncy Castle library, and TeX. The goal of the project was the study and analysis of the CRYSTALS public-key (asymmetric) cryptographic suite.
A simulation of the BB84 protocol in a Jupyter Notebook using the code from https://qiskit.org/textbook/ch-algorithms/quantum-key-distribution.html. Protocol steps until key sifting have been implemented. Error correction & parameter estimation were not executed.
The title of the thesis is Shor's algorithm in Quantum Cryptography. This repository contains the data and Jupyter notebooks containing the codes used in the Quantum simulations of different variants of Shor's quantum factoring algorithm. While IBM Qiskit has already implemented the algorithm using the standard Quantum Fourier Transform (QFT), t…
3rd year bachelor project: Implementation the "Honest-but-Curious set intersection" cryptograpic system, where n people, each one with a set C_i, comunicate with each other in such a way that, after comunicating, everyone knows the interception of every set C_i, without gaining any further information about the set of other people. (Documentatio…