introduction-to-algorithms
Practical-Cryptography-for-Developers-Book
introduction-to-algorithms | Practical-Cryptography-for-Developers-Book | |
---|---|---|
1 | 3 | |
109 | 3,267 | |
- | - | |
5.8 | 2.3 | |
5 months ago | about 1 month ago | |
CSS | CSS | |
- | MIT License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
introduction-to-algorithms
-
What language(s) would I need to learn to build a D&D database/library?
Introduction to Algorithms is a good book for algorithms/data structures. You can find the fourth edition here. Algorithms & data structures are mostly language-agnostic.
Practical-Cryptography-for-Developers-Book
- GitHub - Practical Cryptography for Developers Book
-
Svetlin Nakov a.k.a. Satoshi Nakamoto - The Bitcoin Creator Revealed
He has written numerous free books in the fields of blockchain, programming languages, cybersecurity, and computational linguistics, and Svetlin Nakov [4] (alias Satoshi Nakamoto) was Awarded a Doctor of Philosophy(Ph.D) Degree in Informatics of Bulgarian Academy of Sciences (2010)/B.A.S. official website[5] / More info about B.A.S.[2]).He (Nakamoto - Svetlin Nakov) is about to finish his work in Cryptography For Developers[7], which he publishes in stages in Guthub[8]...Practical Cryptography for Developers is a modern practical open source (github) book about cryptography for developers with code examples, covering core concepts like:hashes[9] (SHA-3 [10] and BLAKE)**2** [19]#BLAKE2), MAC codes (like Hash-based message authentication code/HMAC/ and Galois Message Authentication Code (GMAC)[11], key derivation functions (like scrypt**,** Argon2), Key-agreement protocol s (like Diffie–Hellman key exchange (DHKE), Elliptic curve Diffie–Hellman, symmetric ciphers (like Advanced Encryption Standard (AES) and Salsa20, cipher block modes, authenticated encryption, Authenticated encryption (AEAD), Cipher suite (AES-GCM), ChaCha20-Poly1305 [12], Binary relation, asymetric ciphers[13] and public-key cryptosystems [RSA), Elliptic curve cryptography (ECC), Integrated Encryption Scheme (ECIES), I-SECG elliptic curve sect256k1, Curve25519), digital signatures (ECDSA [14] and EdDSA [15]), secure random numbers (PRNG [16],**CSRNG quantum-safe (quantum resistant) cryptography DApps,** Solidity**,** InterPlanetary File System (IPFS) by Svetlin Nakov and SoftUni Team, 2018, ISBN 978-619-00-0802-6.
-
Welcome – Practical Cryptography for Developers
https://github.com/nakov/Practical-Cryptography-for-Develope...
Similarly, the Java section essentially mentions a single, obscure library besides the JCE and Bouncy Castle:
What are some alternatives?
dsa.js-data-structures-algorithms-javascript - 🥞Data Structures and Algorithms explained and implemented in JavaScript + eBook
constantine - Constantine: modular, high-performance, zero-dependency cryptography stack for proof systems and blockchain protocols.
src - LPIC2 Exam Prep
swift-crypto - Open-source implementation of a substantial portion of the API of Apple CryptoKit suitable for use on Linux platforms.
thejsway - The JavaScript Way book
dvdisaster - A tool providing additional ECC protection for optical media (unofficial version)
wayland-book - PDF version of Drew DeVault's Wayland Book from https://wayland-book.com/
python-ecdsa - pure-python ECDSA signature/verification and ECDH key agreement