Skip to main content

Fancy cryptography in the wild🎩

Cryptography Resources Reading

via Bas Westerbaan

A curated and crowdsourced list of ~*fancy*~ cryptography protocols, currently deployed at scale.

Some rabbit holes I’m falling down:

Eli Grubb
Author
Eli Grubb
I am a privacy-oriented software engineer with a strong foundation in applied cryptography, reliable data systems, and secure system design.