Pinned Repositories
BigInteger
An Implementation of BigNumber library in C++
CNYES_NEWS_CRAWLER
Easily getting the news from CNYES
Docker-Tor-Hidden-Service-for-CTF
Establish a onion website with docker for CTF
Implementation-of-LBPKSE
This is an impementation of paper, Lattice-based public key searchable encryption with fine-grained access control for edge computing.
NCCU_Bioinformatics_Final
NCCU Bioinformatics Final Project
Password-based-Authenticated-Key-Exchange-from-Lattices
Implement Password-based Authenticated Key Exchange from Lattices protocol
Policy-controlled-Signature-from-NTRU-Lattice
zyliutw's Repositories
zyliutw/Implementation-of-LBPKSE
This is an impementation of paper, Lattice-based public key searchable encryption with fine-grained access control for edge computing.
zyliutw/awesome-crypto-papers
A curated list of cryptography papers, articles, tutorials and howtos.
zyliutw/awesome-cryptography
A curated list of cryptography resources and links.
zyliutw/crypto-js
JavaScript library of crypto standards.
zyliutw/frodo
practical quantum-secure key encapsulation from generic lattices
zyliutw/Full_PEKS
zyliutw/HIBP-IPFE
The code implementation of Hierarchical Identity-based Puncturable Inner-product Functional Encryption
zyliutw/ibecode
zyliutw/latex-resources
Collection of LaTeX resources and examples.
zyliutw/lattigo
A library for lattice-based homomorphic encryption in Go
zyliutw/liboqs
C library for quantum-resistant cryptographic algorithms.
zyliutw/libsafecrypto
WP6 of the SAFEcrypto project - a suite of lattice-based cryptographic schemes
zyliutw/Lol
Λ ⚬ λ: Functional Lattice Cryptography
zyliutw/malware-classification
Towards Building an Intelligent Anti-Malware System: A Deep Learning Approach using Support Vector Machine for Malware Classification
zyliutw/Malware-Detection-using-Deep-Learning
First, we generate images from benign files and malware. Second, by using deep learning, we train a model to detect malware. Then, by the trained model, we detect malware. By using malware images and deep learning, we can detect malware fast since we do not need any static analysis or dynamic analysis.
zyliutw/middle-product-LWE-signature
zyliutw/module_gaussian_lattice
zyliutw/mtheme
A modern LaTeX Beamer theme
zyliutw/NCCU-Thesis-Overleaf-Frame
NCCU thesis Chinese version template
zyliutw/NEW_YORK_NEWS_CRAWLER
zyliutw/NTRU-KEM
Reference and AVX2 optimized implementations of NTRU KEM, accompanying the CHES2017 paper "High-speed key encapsulation from NTRU"
zyliutw/one-pixel-attack-keras
Keras implementation of "One pixel attack for fooling deep neural networks" using differential evolution on Cifar10 and ImageNet
zyliutw/oxford-lattice-school-lessons
zyliutw/pdid
Password-authenticated Decentralized Identities
zyliutw/ramme
Unofficial Instagram Desktop App
zyliutw/raptor
zyliutw/RFGuess
基于机器学习的社工字典生成工具. A Machine Learning Approach for Password Guessing. The reproduction of (https://www.usenix.org/conference/usenixsecurity23/presentation/wang-ding-password-guessing)
zyliutw/SecondRound
初學者寫給初學者的演算法教學
zyliutw/software_design_final
zyliutw/zyliutw.github.io
A simple and elegant jekyll theme for academic personal homepage