CardsAgainstCryptography / CACLinks
A party game for nerdy cryptographers. Shamelessly based on Cards Against Humanity.
☆322Updated 5 years ago
Alternatives and similar repositories for CAC
Users that are interested in CAC are comparing it to the libraries listed below
Sorting:
- Constant-Time Toolkit☆296Updated 6 years ago
- Checking that functions are constant time with Valgrind☆184Updated 8 years ago
- A collection of common (interesting) cryptographic mistakes and learning resources.☆344Updated this week
- Crypto Audit Guidelines☆134Updated 4 years ago
- New TLS Padding Oracles☆125Updated 2 years ago
- Signed/Encrypted ARchive: always-encrypted tar-like archive tool with optional signature support☆356Updated 2 years ago
- TLS - what can go wrong?☆107Updated 6 years ago
- Noise Specification☆455Updated 6 years ago
- free crypto audit☆31Updated 8 years ago
- One-end encryption, stronger than end-to-end☆220Updated 2 years ago
- Use a TPM to store a TOTP token in order to attest boot state to another device☆208Updated last year
- ☆140Updated 2 months ago
- Links to stuff arising from or related to the HACS workshop.☆34Updated 7 years ago
- Λ ⚬ λ: Functional Lattice Cryptography☆231Updated 4 years ago
- ☆81Updated 5 years ago
- ☆98Updated 8 years ago
- Efficient TLS termination inside Intel SGX enclaves for existing applications☆106Updated 3 years ago
- Jump to Full Encryption☆61Updated 8 years ago
- Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS☆118Updated 8 years ago
- Ledger's Advanced Side-Channel Analysis Repository☆394Updated last year
- Off-the-Record Messaging Protocol version 4. -This is a draft- This repository is a mirror of http://bugs.otr.im/otrv4/otrv4☆188Updated 2 years ago
- An entropy generator using SDR peripherals, including rtl-sdr and BladeRF☆359Updated 4 years ago
- Deployments of fancy cryptography☆145Updated last month
- Main source code repository of the Tamarin prover for security protocol verification.☆460Updated this week
- Play battleships using BGP☆435Updated 6 years ago
- ☆198Updated this week
- A python library that implements a number of Privacy Enhancing Technolgies☆133Updated 2 years ago
- DEPRECATED – See NOTICE below about migration to new repository – Post-quantum key exchange from the ring learning with errors problem☆59Updated 8 years ago
- Intuitive Advanced Cryptography☆438Updated 2 years ago
- ☆58Updated 8 years ago