Skip to content
View 1nfocalypse's full-sized avatar
💭
Simulating NAS with enough caffeine to kill a horse
💭
Simulating NAS with enough caffeine to kill a horse

Block or report 1nfocalypse

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
1nfocalypse/README.md

Hi, I'm 1nfocalypse. I'm a recent graduate, with a BS in Computer Science. I'm primarily interested in algorithm development, applied mathematics, security, and systems. I'm also a bit of a cyberpunk nerd. Currently working on multiple projects, including:

  • Numerical trading suite, particularly specialized for SOL and derivative coins. (Unfortunately proprietary)
  • ShangMi 4, AES, RSA, ElGamal, ECDLP implementations
  • ShangMi 3, SHA256, and Keccak implementations
  • Development of an Elliptic Curve based CSPRNG algorithm for use in a custom stream cipher
  • The Traffic Throughput Optimization Project (almost done)
  • Numerical Analysis Writeup
  • Cryptography Writeup Problems/Solutions
  • P2P E2E messaging client utilizing crypto that I've rolled
  • Reason Preexploitation Framework
  • Coding Theory Writeup + Examples?
  • EnkiNum Numerical Analysis Library
  • Automated network priority resolution standard for CANs
  • Research on Fractionated Cavity Loaders utilizing Plausibly Deniable Encryption
  • Research and (hopefully) implementation of Shpilrain's Algorithm, based on the undecidability of problems regarding the free word group in Combinatorial Group Theory
  • Research on solutions to decentralized, anonymous, encrypted group messaging.
  • Research on compression efficiency, particularly with regards to finding optimality for expected compression in number of symbols permitted via decompositional preprocessing

Pinned Loading

  1. CryptoWriteup CryptoWriteup Public

    A collection of notes on mathematical Cryptography, ranging from classical methods through contemporary.

    6

  2. Autonomous-Vehicle-Controller Autonomous-Vehicle-Controller Public

    Forked from marystirling/okayestcontroller

    A controller built to accept novel set speed, generate a predictive model, and attempt to execute it. A collaborative project for a class.

    C++

  3. Corto Corto Public

    C++ implementation of verified GOST spec. ciphers and hash. (Kuznyechik, Magma, Streebog)

    C++

  4. ROXy ROXy Public

    A toy showcasing a symmetric and asymmetric implementation of Plausibly Deniable Encryption based on a paper by Canetti et. al.

    C++

  5. AMBiDEX AMBiDEX Public

    A toy implementation of Chaum's Dining Cryptographers problem to illustrate programmatic functionality over a reliable broadcast network, along with a brief explanation.

    C++ 1

  6. Snow Snow Public

    A multithreaded Python3 implementation of Miller-Rabin probabilistic primality testing.

    Python