CardsAgainstCryptography / CACLinks
A party game for nerdy cryptographers. Shamelessly based on Cards Against Humanity.
☆322Updated 5 years ago
Alternatives and similar repositories for CAC
Users that are interested in CAC are comparing it to the libraries listed below
Sorting:
- A collection of common (interesting) cryptographic mistakes and learning resources.☆350Updated last month
- Constant-Time Toolkit☆296Updated 6 years ago
- Checking that functions are constant time with Valgrind☆188Updated 8 years ago
- ☆82Updated 5 years ago
- Signed/Encrypted ARchive: always-encrypted tar-like archive tool with optional signature support☆356Updated 2 years ago
- One-end encryption, stronger than end-to-end☆220Updated 2 years ago
- ☆99Updated 9 years ago
- This software is part of "Supersingular Isogeny Key Encapsulation", a submission to the NIST Post-Quantum Standardization project.☆61Updated 2 years ago
- Off-the-Record Messaging Protocol version 4. -This is a draft- This repository is a mirror of http://bugs.otr.im/otrv4/otrv4☆189Updated 2 years ago
- Sphinx-based Password Storage low-level library☆130Updated 6 months ago
- Software for "Quantum-Resistant Cryptosystems from Supersingular Elliptic Curve Isogenies"☆89Updated 6 years ago
- Crypto Audit Guidelines☆134Updated 4 years ago
- Noise Specification☆457Updated 6 years ago
- ☆140Updated 3 months ago
- Reference implementation of the Picnic post-quantum signature scheme☆165Updated 2 years ago
- Signature scheme submitted to NIST's Post-Quantum Cryptography Project☆75Updated 7 years ago
- Blogs about Cryptography/Security to follow☆46Updated 3 years ago
- SIDH Library is a fast and portable software library that implements state-of-the-art supersingular isogeny cryptographic schemes. The ch…☆323Updated 2 years ago
- Intuitive Quantum Computation and Post-Quantum Cryptography☆63Updated 2 years ago
- Links to stuff arising from or related to the HACS workshop.☆34Updated 7 years ago
- Supporting materials for our EuroS&P paper: Automated Verification for Secure Messaging Protocols and their Implementations: A Symbolic a…☆37Updated 3 years ago
- Lecture notes for a course on cryptography☆538Updated last year
- TLS - what can go wrong?☆108Updated 6 years ago
- Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS☆118Updated 8 years ago
- ☆57Updated 8 years ago
- IP-format-preserving encryption, with a dedicated 4-byte cipher☆107Updated 4 years ago
- free crypto audit☆31Updated 8 years ago
- Jump to Full Encryption☆61Updated 8 years ago
- Freely available cryptographic iconography☆66Updated 8 years ago
- Classical simulator for Kuperberg's quantum collimation sieve, generalized to arbitrary finite cyclic groups and focused on CSIDH-512.☆14Updated 6 years ago