CardsAgainstCryptography / CACLinks
A party game for nerdy cryptographers. Shamelessly based on Cards Against Humanity.
☆322Updated 5 years ago
Alternatives and similar repositories for CAC
Users that are interested in CAC are comparing it to the libraries listed below
Sorting:
- A collection of common (interesting) cryptographic mistakes and learning resources.☆349Updated 2 weeks ago
- Constant-Time Toolkit☆296Updated 6 years ago
- ☆99Updated 8 years ago
- Checking that functions are constant time with Valgrind☆187Updated 8 years ago
- Crypto Audit Guidelines☆134Updated 4 years ago
- This software is part of "Supersingular Isogeny Key Encapsulation", a submission to the NIST Post-Quantum Standardization project.☆61Updated 2 years ago
- Off-the-Record Messaging Protocol version 4. -This is a draft- This repository is a mirror of http://bugs.otr.im/otrv4/otrv4☆189Updated 2 years ago
- ☆81Updated 5 years ago
- Software for "Quantum-Resistant Cryptosystems from Supersingular Elliptic Curve Isogenies"☆89Updated 6 years ago
- A browsable archive of all Underhanded Crypto Contest entries.☆35Updated 6 years ago
- One-end encryption, stronger than end-to-end☆220Updated 2 years ago
- Links to stuff arising from or related to the HACS workshop.☆34Updated 7 years ago
- Sphinx-based Password Storage low-level library☆130Updated 5 months ago
- dude, is my code constant time?☆181Updated last year
- TLS - what can go wrong?☆108Updated 6 years ago
- A python library that implements a number of Privacy Enhancing Technolgies☆135Updated 2 years ago
- Signature scheme submitted to NIST's Post-Quantum Cryptography Project☆75Updated 7 years ago
- Reference implementation of the Picnic post-quantum signature scheme☆164Updated 2 years ago
- ☆57Updated 8 years ago
- Noise Specification☆455Updated 6 years ago
- DEPRECATED – See NOTICE below about migration to new repository – Post-quantum key exchange from the ring learning with errors problem☆59Updated 8 years ago
- A C implementation of elliptic-curve-based Direct Anonymous Attestation (DAA) signatures. Created to support the Xaptum Edge Network Fabr…☆44Updated 3 years ago
- Testing Schnorr's factorization claim in Sage☆304Updated 2 years ago
- CryptoBib Database for Developers☆44Updated last month
- Guidelines for low-level cryptography software☆1,159Updated 2 years ago
- Intuitive Quantum Computation and Post-Quantum Cryptography☆63Updated 2 years ago
- IP-format-preserving encryption, with a dedicated 4-byte cipher☆106Updated 4 years ago
- Classical simulator for Kuperberg's quantum collimation sieve, generalized to arbitrary finite cyclic groups and focused on CSIDH-512.☆14Updated 6 years ago
- SIDH Library is a fast and portable software library that implements state-of-the-art supersingular isogeny cryptographic schemes. The ch…☆324Updated 2 years ago
- free crypto audit☆31Updated 8 years ago