CardsAgainstCryptography / CACLinks
A party game for nerdy cryptographers. Shamelessly based on Cards Against Humanity.
☆323Updated 5 years ago
Alternatives and similar repositories for CAC
Users that are interested in CAC are comparing it to the libraries listed below
Sorting:
- A collection of common (interesting) cryptographic mistakes and learning resources.☆357Updated 3 months ago
- Constant-Time Toolkit☆299Updated 7 years ago
- ☆82Updated 5 years ago
- Checking that functions are constant time with Valgrind☆192Updated 8 years ago
- One-end encryption, stronger than end-to-end☆220Updated 2 years ago
- Off-the-Record Messaging Protocol version 4. -This is a draft- This repository is a mirror of http://bugs.otr.im/otrv4/otrv4☆191Updated 3 years ago
- ☆100Updated 9 years ago
- Crypto Audit Guidelines☆134Updated 4 years ago
- Signed/Encrypted ARchive: always-encrypted tar-like archive tool with optional signature support☆355Updated 2 years ago
- Noise Specification☆459Updated 7 years ago
- Software for "Quantum-Resistant Cryptosystems from Supersingular Elliptic Curve Isogenies"☆89Updated 6 years ago
- This software is part of "Supersingular Isogeny Key Encapsulation", a submission to the NIST Post-Quantum Standardization project.☆61Updated 2 years ago
- Links to stuff arising from or related to the HACS workshop.☆34Updated 7 years ago
- Sphinx-based Password Storage low-level library☆129Updated 9 months ago
- ☆58Updated 8 years ago
- A browsable archive of all Underhanded Crypto Contest entries.☆35Updated 6 years ago
- TLS - what can go wrong?☆108Updated 6 years ago
- Guidelines for low-level cryptography software☆1,173Updated 2 years ago
- dude, is my code constant time?☆190Updated last year
- A python library that implements a number of Privacy Enhancing Technolgies☆135Updated 3 years ago
- Lecture notes for a course on cryptography☆550Updated last year
- ☆202Updated 2 weeks ago
- Meta-repository for Miscreant: misuse-resistant symmetric encryption library with AES-SIV (RFC 5297) and AES-PMAC-SIV support☆474Updated 6 years ago
- Blogs about Cryptography/Security to follow☆46Updated 4 years ago
- List of crypto projects that might not suck☆423Updated 2 years ago
- ☆144Updated 6 months ago
- Memory-hard scheme Argon2☆207Updated 4 years ago
- Reference implementation of the Picnic post-quantum signature scheme☆166Updated 2 years ago
- Signature scheme submitted to NIST's Post-Quantum Cryptography Project☆74Updated 7 years ago
- IP-format-preserving encryption, with a dedicated 4-byte cipher☆107Updated 4 years ago