Skip to content
View 1nfocalypse's full-sized avatar
💭
Simulating NAS with enough caffeine to kill a horse
💭
Simulating NAS with enough caffeine to kill a horse
Block or Report

Block or report 1nfocalypse

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
1nfocalypse/README.md

Hi, I'm 1nfocalypse. I'm a recent graduate, with a BS in Computer Science. I'm primarily interested in algorithm development, applied mathematics, security, and systems. I'm also a bit of a cyberpunk nerd. Currently working on multiple projects, including:

  • The Traffic Throughput Optimization Project (almost done)
  • RSA, ElGamal, ECDLP implementations
  • Numerical Analysis Writeup
  • Cryptography Writeup Problems/Solutions
  • P2P messaging client using ECDLP
  • Reason Preexploitation Framework
  • Coding Theory Writeup + Exampes?
  • Cutter.re module
  • EnkiNum Numerical Analysis Library
  • Automated network priority resolution standard
  • Research on Fractionated Cavity Loaders
  • Research on Plausible Deniability XOR Crypters
  • Research and (hopefully) implementation of Shpilrain's Algorithm, based on the undecidability of problems regarding the free word group in Combinatorial Group Theory
  • Research on solutions to decentralized, anonymous, encrypted group messaging.
  • Research on compression efficiency, particularly with regards to finding optimality for expected compression in number of symbols permitted via decompositional preprocessing

Currently funemployed, but my website with professional contact information will be up soon if you are interested in reaching out.

Pinned

  1. CryptoWriteup CryptoWriteup Public

    A collection of notes on mathematical Cryptography, ranging from classical methods through contemporary.

    6

  2. Autonomous-Vehicle-Controller Autonomous-Vehicle-Controller Public

    Forked from marystirling/okayestcontroller

    A controller built to accept novel set speed, generate a predictive model, and attempt to execute it. A collaborative project for a class.

    C++

  3. Feisty Feisty Public

    A toy implementation of a Feistel Network. Supports 256 bit keys with 16 rounds over a XOR cipher. Built primarily for education.

    C++

  4. Entropic Entropic Public

    A toy Viginere cipher tool in C++. Built primarily for education. Supports custom block keys and pseudorandomly generated Vernam-like keys.

    C++

  5. AMBiDEX AMBiDEX Public

    A toy implementation of Chaum's Dining Cryptographers problem to illustrate programmatic functionality over a reliable broadcast network, along with a brief explanation.

    C++

  6. TheNXFury/NXFuryInfoSec TheNXFury/NXFuryInfoSec Public

    Forked from ossu/computer-science

    🎓 Path to a free self-taught education in Information Security!

    12 4