Skip to content
View 1nfocalypse's full-sized avatar
💭
Simulating NAS with enough caffeine to kill a horse
💭
Simulating NAS with enough caffeine to kill a horse

Block or report 1nfocalypse

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
1nfocalypse/README.md

Hi, I'm 1nfocalypse. I'm a recent graduate, with a BS in Computer Science. I'm primarily interested in algorithm development, applied mathematics, security, and systems. I'm also a bit of a cyberpunk nerd.

I currently mostly work with numerical and (to use Knuth's verbiage) seminumerical algorithms. I also particularly enjoy cryptography, both theory and practice. I'm currently working primarily with GCC's libstdc++-v3, in which I implemented Philox Engine for C++26 (under review) and am currently working on the linalg header. I also maintain an entirely-too-large list of personal projects that I'm either currently working on, have started, or intend on working on, which can be found below. If you're interested in contacting me, I can be found at 1nfocalypse(at)protonmail(dot)com. I may miss your email in the sea of GCC mailing list stuff - if I don't respond, please feel free to bump it up in my inbox again.

Current Projects:

  • libstdc++-v3 linalg header
  • Development of a dual-hardness Elliptic Curve based CSPRNG algorithm, reliant on the ECDLP, Elligator 2, and bit truncation.
  • ShangMi cryptologic suite implementation
  • Hacker's Fright (A writeup on the book "Hacker's Delight")
  • Serge Lang's Algebraic Number Theory (group read)
  • Numerical Analysis Writeup
  • AES, RSA, ElGamal implementations
  • SHA256 and Keccak implementations
  • P2P E2E messaging client utilizing crypto that I've rolled
  • Coding Theory Writeup + Examples
  • Automated network priority resolution standard for CANs based on error-correcting codes
  • Research on Fractionated Cavity Loaders utilizing Plausibly Deniable Encryption
  • Research and (hopefully) implementation of Shpilrain's Algorithm, based on the undecidability of problems regarding the free word group in Combinatorial Group Theory
  • Research on solutions to decentralized, anonymous, encrypted group messaging.
  • Research on compression efficiency, particularly with regards to finding optimality for expected compression in number of symbols permitted via decompositional preprocessing
  • Library for wrapping C++ sockets to provide a better interface

Pinned Loading

  1. Cracking-Chaos Cracking-Chaos Public

    An informal, security oriented walkthrough of pseudo-random number generators, exploring design, function, and exploitation.

    Python 1

  2. Corto Corto Public

    C++ implementation of verified GOST spec. ciphers and hash. (Kuznyechik, Magma, Streebog)

    C++

  3. ROXy ROXy Public

    A toy showcasing a symmetric and asymmetric implementation of Plausibly Deniable Encryption based on a paper by Canetti et. al.

    C++

  4. CryptoWriteup CryptoWriteup Public

    A collection of notes on mathematical Cryptography, ranging from classical methods through contemporary.

    8

  5. AMBiDEX AMBiDEX Public

    A toy implementation of Chaum's Dining Cryptographers problem to illustrate programmatic functionality over a reliable broadcast network, along with a brief explanation.

    C++ 1

  6. Snow Snow Public

    A multithreaded Python3 implementation of Miller-Rabin probabilistic primality testing.

    Python