CardsAgainstCryptography / CAC
A party game for nerdy cryptographers. Shamelessly based on Cards Against Humanity.
☆321Updated 5 years ago
Alternatives and similar repositories for CAC
Users that are interested in CAC are comparing it to the libraries listed below
Sorting:
- Constant-Time Toolkit☆296Updated 6 years ago
- A collection of common (interesting) cryptographic mistakes and learning resources.☆339Updated last week
- Cingulata (pronounced "tchingulata") is a compiler toolchain and RTE for running C++ programs over encrypted data by means of fully homom…☆406Updated last year
- Checking that functions are constant time with Valgrind☆181Updated 8 years ago
- ☆97Updated 8 years ago
- Λ ⚬ λ: Functional Lattice Cryptography☆230Updated 4 years ago
- Crypto Audit Guidelines☆134Updated 4 years ago
- Links to stuff arising from or related to the HACS workshop.☆34Updated 7 years ago
- Deployments of fancy cryptography☆142Updated 2 weeks ago
- Noise Specification☆454Updated 6 years ago
- ☆81Updated 5 years ago
- A place for useful crypto-related resources plus some of my fav stuff☆220Updated 3 years ago
- A repository tracking releases of NIST's ACVP server. See www.github.com/usnistgov/ACVP for the protocol.☆73Updated 3 weeks ago
- Sphinx-based Password Storage low-level library☆130Updated 3 months ago
- Software for "Quantum-Resistant Cryptosystems from Supersingular Elliptic Curve Isogenies"☆90Updated 5 years ago
- Post-quantum key exchange from the learning with errors problem — from the paper "Frodo: Take off the ring! Practical, Quantum-Secure Key…☆46Updated 7 years ago
- Signed/Encrypted ARchive: always-encrypted tar-like archive tool with optional signature support☆356Updated 2 years ago
- This software is part of "Supersingular Isogeny Key Encapsulation", a submission to the NIST Post-Quantum Standardization project.☆61Updated 2 years ago
- New TLS Padding Oracles☆125Updated 2 years ago
- Reference implementation of the Picnic post-quantum signature scheme☆160Updated last year
- free crypto audit☆31Updated 8 years ago
- Main source code repository of the Tamarin prover for security protocol verification.☆456Updated last month
- Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS☆118Updated 8 years ago
- A python library that implements a number of Privacy Enhancing Technolgies☆132Updated 2 years ago
- Use a TPM to store a TOTP token in order to attest boot state to another device☆207Updated last year
- DEPRECATED – See NOTICE below about migration to new repository – Post-quantum key exchange from the ring learning with errors problem☆59Updated 8 years ago
- Intuitive Advanced Cryptography☆436Updated 2 years ago
- One-end encryption, stronger than end-to-end☆219Updated 2 years ago
- XPIR: Private Information Retrieval for Everyone☆119Updated 3 years ago
- SIDH Library is a fast and portable software library that implements state-of-the-art supersingular isogeny cryptographic schemes. The ch…☆322Updated 2 years ago