A party game for nerdy cryptographers. Shamelessly based on Cards Against Humanity.
☆324May 13, 2020Updated 5 years ago
Alternatives and similar repositories for CAC
Users that are interested in CAC are comparing it to the libraries listed below
Sorting:
- A BibTeX collection on Zero-Knowledge Proofs☆16Dec 4, 2018Updated 7 years ago
- Slides from talks and other materials related to post-quantum crypto☆12Feb 20, 2021Updated 5 years ago
- Implementations of do255e and do255s in C and assembly☆25May 3, 2021Updated 4 years ago
- Python library for vectorial Boolean functions in cryptography☆11Nov 15, 2023Updated 2 years ago
- Deterministic And Verifiable Randomness On Schnorr signatures☆12Nov 18, 2017Updated 8 years ago
- Implementation of do255e and do255s in Go☆23Dec 14, 2020Updated 5 years ago
- A BibTeX collection on Isogeny-based Cryptography☆18Jan 20, 2023Updated 3 years ago
- Constant-Time Toolkit☆300Aug 29, 2018Updated 7 years ago
- Please see https://github.com/hacspec/hax☆246Feb 12, 2024Updated 2 years ago
- discohash☆15Oct 30, 2021Updated 4 years ago
- OPAQUE asymmetric PAKE, and its threshold implementation. Experimental, not audited.☆17Jun 16, 2021Updated 4 years ago
- Package fourq implements FourQ, a high-speed elliptic curve at the 128-bit security level.☆54Oct 14, 2024Updated last year
- ☆24Jul 7, 2022Updated 3 years ago
- Implements ristretto255, a fast prime-order group.☆110Feb 19, 2026Updated 2 weeks ago
- ☆31Updated this week
- ☆21Dec 16, 2022Updated 3 years ago
- DEciding Equivalence Properties in SECurity protocols☆20Mar 1, 2023Updated 3 years ago
- Implementation of the Jubjub elliptic curve group☆121Feb 25, 2026Updated last week
- Examples for EasyCrypt Lectures☆28Jan 28, 2026Updated last month
- SageMath library for constructing elliptic curves☆74Jul 14, 2023Updated 2 years ago
- CDLS: Proving Knowledge of Committed Discrete Logarithms with Soundness☆11Nov 2, 2024Updated last year
- Implementation of cryptographic primitives in Go☆13Mar 13, 2023Updated 2 years ago
- High Assurance Cryptographic Software☆10Dec 23, 2025Updated 2 months ago
- Models for authenticated key exchange in Tamarin☆12Oct 9, 2019Updated 6 years ago
- Vector Commitments with Constant-Sized, Updatable Proofs and Linear-Sized Public Parameters☆11Jun 3, 2021Updated 4 years ago
- Supporting materials for our EuroS&P paper: Automated Verification for Secure Messaging Protocols and their Implementations: A Symbolic a…☆37May 30, 2022Updated 3 years ago
- Post-quantum Wireguard (Theory)☆12Sep 9, 2020Updated 5 years ago
- Standardizing Security Titles☆13Dec 31, 2025Updated 2 months ago
- Passive-Swoosh: Practical Lattice-Based Non-Interactive Key Exchange☆27Jun 7, 2024Updated last year
- Crypto library☆67Dec 9, 2025Updated 2 months ago
- ☆22Sep 6, 2016Updated 9 years ago
- CrashDB is an ephemeral in-memory NoSQL database for the confident developer.☆22Oct 11, 2018Updated 7 years ago
- Optimized Binary GCD for Modular Inversion☆52Oct 28, 2020Updated 5 years ago
- Guidelines for low-level cryptography software☆1,193Jun 11, 2023Updated 2 years ago
- Code to fuzz bignum libraries☆46Nov 11, 2018Updated 7 years ago
- Cryptographic Addition Chain Generation in Go☆195Jun 30, 2024Updated last year
- Parses https://eprint.iacr.org/eprint-bin/search.pl?last=365&title=1 and sends you an email with the latest papers☆15Nov 11, 2020Updated 5 years ago
- Reference implementations of the GIMLI permutation☆15Jul 9, 2017Updated 8 years ago
- Military-Grade Password Manager☆12Dec 6, 2016Updated 9 years ago