CardsAgainstCryptography / CACLinks
A party game for nerdy cryptographers. Shamelessly based on Cards Against Humanity.
☆324Updated 5 years ago
Alternatives and similar repositories for CAC
Users that are interested in CAC are comparing it to the libraries listed below
Sorting:
- A collection of common (interesting) cryptographic mistakes and learning resources.☆366Updated 7 months ago
- Constant-Time Toolkit☆301Updated 7 years ago
- Checking that functions are constant time with Valgrind☆196Updated 8 years ago
- ☆100Updated 9 years ago
- ☆82Updated 5 years ago
- Signed/Encrypted ARchive: always-encrypted tar-like archive tool with optional signature support☆355Updated 3 years ago
- Links to stuff arising from or related to the HACS workshop.☆34Updated 7 years ago
- Crypto Audit Guidelines☆134Updated 5 years ago
- One-end encryption, stronger than end-to-end☆243Updated last week
- Off-the-Record Messaging Protocol version 4. -This is a draft- This repository is a mirror of http://bugs.otr.im/otrv4/otrv4☆192Updated 3 years ago
- Software for "Quantum-Resistant Cryptosystems from Supersingular Elliptic Curve Isogenies"☆88Updated 6 years ago
- A python library that implements a number of Privacy Enhancing Technolgies☆135Updated 3 years ago
- Sphinx-based Password Storage low-level library☆129Updated last year
- Blogs about Cryptography/Security to follow☆46Updated 4 years ago
- This software is part of "Supersingular Isogeny Key Encapsulation", a submission to the NIST Post-Quantum Standardization project.☆62Updated 3 years ago
- A browsable archive of all Underhanded Crypto Contest entries.☆35Updated 6 years ago
- Noise Specification☆460Updated 7 years ago
- ☆145Updated 9 months ago
- Reference implementation of the Picnic post-quantum signature scheme☆168Updated 2 years ago
- TLS - what can go wrong?☆108Updated 3 weeks ago
- ☆170Updated 4 years ago
- Λ ⚬ λ: Functional Lattice Cryptography☆231Updated 4 years ago
- A place for useful crypto-related resources plus some of my fav stuff☆220Updated 4 years ago
- Ledger's Advanced Side-Channel Analysis Repository☆401Updated 2 years ago
- Lecture notes for a course on cryptography☆569Updated 2 years ago
- Intuitive Quantum Computation and Post-Quantum Cryptography☆63Updated 3 years ago
- Use a TPM to store a TOTP token in order to attest boot state to another device☆211Updated 2 years ago
- Testing Schnorr's factorization claim in Sage☆306Updated 3 years ago
- Signature scheme submitted to NIST's Post-Quantum Cryptography Project☆74Updated 8 years ago
- ☆24Updated 3 years ago