- Binary Quadratic Forms, An Algorithmic Approach - Algorithms and Computation in Mathematics • Volume 20
- https://crypto.stackexchange.com/questions/10467/what-is-the-lowest-level-of-mathematics-required-in-order-to-understand-how-encr
- https://intensecrypto.org/public/index.html
- Quadralay's Cryptography Archive
- https://crypto.stackexchange.com/questions/53321/what-are-the-coordinates-of-a-generator-point
- https://www.michaelstraka.com/posts/classgroups/
- https://docs.google.com/document/d/1sdZqVdXOY9h85oVP2E47SFDMlsAbiPZY1LcaPAZ5LV8/edit
- http://safecurves.cr.yp.to/
- https://blog.cr.yp.to/index.html
- https://github.com/sobolevn/awesome-cryptography
- https://github.com/pFarb/awesome-crypto-papers
- https://github.com/SebastianElvis/crypto-lecture-notes/
- https://www.garykessler.net/library/crypto.html
- https://cseweb.ucsd.edu/~mihir/papers/gb.pdf
- http://crypto.stanford.edu/~dabo/cryptobook/
- http://www.wisdom.weizmann.ac.il/~oded/foc-book.html
- http://cacr.uwaterloo.ca/hac/
- https://crypto.stanford.edu/~blynn/
- http://math.tut.fi/~ruohonen/MC.pdf
- Practical Cryptographic Systems
- https://cse.iitkgp.ac.in/~debdeep/courses_iitkgp/FCrypto/index.htm
- https://courses.cs.washington.edu/courses/cse599b/
- Graduate Cryptography (Topics in Theory) from Northeastern
- Foundations of Cryptography from Northeastern
- Introduction to Cryptography from NYU
- Randomness in Cryptography from NYU
- Introduction to Cryptography
- Cryptography from Princeton
- Cryptography from UIUC
- Applied Cryptography from UIUC
- Classics of Cryptography from Stanford
- Cryptography from Hebrew
- Cryptography from Harvard
- Advanced Topics in Cryptography from UMD
- Introduction to Cryptography from UMD
- Introduction to Modern Cryptography (2nd edition) by Jonathan Katz and Yehuda Lindell
- Cryptography from Berkeley
- Advanced Cryptography from Berkeley
- A Theorist's Toolkit from CMU
- A Course in Cryptography by Rafael Pass and Abhi Shelat
- Handbook of Applied Cryptography
- Foundations of Cryptography 89-856 by Yehuda Lindell
- An intensive introduction to cryptography by Boaz Barak
- Probabilistically Checkable and Interactive Proof Systems from Berkeley
- http://www.ccs.neu.edu/home/viola/classes/gems-08/
- https://www.cs.princeton.edu/courses/archive/spr10/cos433/#NOTES
- https://homes.esat.kuleuven.be/~nsmart/FHE-MPC/
- http://www.cs.bu.edu/~reyzin/teaching/s11cs937/
- http://cs.brown.edu/~seny/2950v/
- Applied Cryptography by David Evans
- The Joy of Cryptography
- https://tlu.tarilabs.com/cryptography/cryptography.html
- https://github.com/isislovecruft/library--/tree/master/cryptography%20%26%20mathematics
- Elliptic Curve Handbook
- Pseudorandomness by Salil Vadhan
- http://www.cs.columbia.edu/~tal/6261/SP20/reading/rand-survey.pdf
- https://mnin.org/write/2006_sshcrypto.html
- https://github.com/claucece/useful-crypto-resources
- https://people.csail.mit.edu/rivest/crypto-security.html
- 图解密码学
- Applied Cryptography: Protocols, Algorithms, and Source Code in C 应用密码学
- Mathematics of Isogeny Based Cryptography
- tools
- https://sefiks.com/2018/12/24/a-gentle-introduction-to-edwards-curve-digital-signature-algorithm-eddsa/
- https://ed25519.cr.yp.to
- EdDSA vs ECDSA
- https://github.com/matter-labs/awesome-zero-knowledge-proofs
- https://github.com/AdamISZ/from0k2bp
- conference
- Zk proof workshop
- ZK #lux
- Zcash 的 #Zcon1
- https://docs.zkproof.org/reference
- https://zkp.science/
- https://github.com/zcash/zips/blob/master/protocol/protocol.pdf
- https://github.com/zcash-hackworks/design-of-sapling-book
- https://www.zfnd.org/blog/a-new-network-stack-for-zcash/
- https://github.com/zcash/zips/blob/master/protocol/sapling.pdf
- https://github.com/zcash/zips/blob/master/zip-0243.rst
- https://docs.google.com/presentation/d/1qsOtMLiBVhVMbeB_R0heTSMRsKnhuOKfhACFiXKM-J0/edit#slide=id.p
- https://github.com/arielgabizon/sapling-security-analysis
- https://github.com/zcash/sapling-security-analysis/blob/master/MaryMallerUpdated.pdf
- A Pragmatic Introduction to Secure Multi-Party Computation
- https://www.mpcalliance.org/learn
- https://github.com/rdragos/awesome-mpc
- From Keys to Databases – Real-World Applications of Secure Multi-Party Computation
- http://www.multipartycomputation.com/mpc-software
- lindell's
- Secure Computation from UMD
- Special Topic in Cryptography: Secure Computation from Berkeley
- Distributing any Elliptic Curve Based Protocol
- This (work) allows us to transform essentially any one-party protocol over an elliptic curve, into an n-party one
- Reliable and Secure Distributed Programming (book)
- Coding Theory, Cryptography and Related Areas? (book)
- https://www.binance.vision/security/threshold-signatures-explained
- https://guutboy.github.io
- incentives
- Distributed Key Generation in the Wild
- Bootstrapping Consensus Without Trusted Setup: Fully Asynchronous Distributed Key Generation
- Revisiting the Distributed Key Generation for Discrete-Log Based Cryptosystems
- https://marsella.github.io/static/mpcsok.pdf
- https://www.eng.biu.ac.il/hazay/publications/
- https://sharemind.cyber.ee/research/