CardsAgainstCryptography / CAC
A party game for nerdy cryptographers. Shamelessly based on Cards Against Humanity.
☆321Updated 4 years ago
Related projects: ⓘ
- A collection of common (interesting) cryptographic mistakes and learning resources.☆314Updated last month
- Constant-Time Toolkit☆294Updated 6 years ago
- Checking that functions are constant time with Valgrind☆173Updated 7 years ago
- Signed/Encrypted ARchive: always-encrypted tar-like archive tool with optional signature support☆354Updated last year
- Noise Specification☆450Updated 5 years ago
- Deployments of fancy cryptography☆113Updated last month
- Crypto Audit Guidelines☆132Updated 3 years ago
- Off-the-Record Messaging Protocol version 4. -This is a draft- This repository is a mirror of http://bugs.otr.im/otrv4/otrv4☆190Updated last year
- Λ ⚬ λ: Functional Lattice Cryptography☆223Updated 3 years ago
- Links to stuff arising from or related to the HACS workshop.☆35Updated 6 years ago
- ☆97Updated 8 years ago
- Cingulata (pronounced "tchingulata") is a compiler toolchain and RTE for running C++ programs over encrypted data by means of fully homom…☆401Updated 7 months ago
- ☆193Updated this week
- Meta-repository for Miscreant: misuse-resistant symmetric encryption library with AES-SIV (RFC 5297) and AES-PMAC-SIV support☆474Updated 5 years ago
- New TLS Padding Oracles☆123Updated last year
- ☆80Updated 4 years ago
- Lecture notes for a course on cryptography☆502Updated 9 months ago
- Main source code repository of the Tamarin prover for security protocol verification.☆409Updated last week
- Sphinx-based Password Storage low-level library☆128Updated 3 months ago
- MLS protocol☆233Updated last week
- CryptoBib Database for Developers☆40Updated last week
- Guidelines for low-level cryptography software☆1,101Updated last year
- List of crypto projects that might not suck☆423Updated last year
- Intuitive Quantum Computation and Post-Quantum Cryptography☆62Updated last year
- Testing Schnorr's factorization claim in Sage☆301Updated 2 years ago
- A python library that implements a number of Privacy Enhancing Technolgies☆130Updated last year
- Understand and mitigate software-observable side-channels☆493Updated 3 years ago
- free crypto audit☆31Updated 7 years ago
- JHU Advanced Topics in Applied Cryptography (601.745)☆50Updated 6 years ago
- One-end encryption, stronger than end-to-end☆195Updated last year