CardsAgainstCryptography / CACLinks
A party game for nerdy cryptographers. Shamelessly based on Cards Against Humanity.
☆322Updated 5 years ago
Alternatives and similar repositories for CAC
Users that are interested in CAC are comparing it to the libraries listed below
Sorting:
- A collection of common (interesting) cryptographic mistakes and learning resources.☆356Updated 3 months ago
- Checking that functions are constant time with Valgrind☆191Updated 8 years ago
- Constant-Time Toolkit☆298Updated 7 years ago
- Crypto Audit Guidelines☆134Updated 4 years ago
- Sphinx-based Password Storage low-level library☆129Updated 8 months ago
- ☆82Updated 5 years ago
- One-end encryption, stronger than end-to-end☆220Updated 2 years ago
- Off-the-Record Messaging Protocol version 4. -This is a draft- This repository is a mirror of http://bugs.otr.im/otrv4/otrv4☆190Updated 2 years ago
- ☆100Updated 9 years ago
- Lecture notes for a course on cryptography☆546Updated last year
- Supporting materials for our EuroS&P paper: Automated Verification for Secure Messaging Protocols and their Implementations: A Symbolic a…☆37Updated 3 years ago
- Links to stuff arising from or related to the HACS workshop.☆34Updated 7 years ago
- A python library that implements a number of Privacy Enhancing Technolgies☆136Updated 2 years ago
- ☆58Updated 8 years ago
- ☆143Updated 5 months ago
- TLS - what can go wrong?☆108Updated 6 years ago
- This software is part of "Supersingular Isogeny Key Encapsulation", a submission to the NIST Post-Quantum Standardization project.☆61Updated 2 years ago
- IP-format-preserving encryption, with a dedicated 4-byte cipher☆107Updated 4 years ago
- Software for "Quantum-Resistant Cryptosystems from Supersingular Elliptic Curve Isogenies"☆89Updated 6 years ago
- Noise Specification☆459Updated 6 years ago
- WARNING: Deprecated! See Privacy Pass☆99Updated 8 years ago
- Git extensions for m-of-n signing and verification on commits/tags.☆153Updated 3 years ago
- Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS☆119Updated 8 years ago
- A C implementation of elliptic-curve-based Direct Anonymous Attestation (DAA) signatures. Created to support the Xaptum Edge Network Fabr…☆44Updated 4 years ago
- free crypto audit☆31Updated 8 years ago
- dude, is my code constant time?☆190Updated last year
- Use a TPM to store a TOTP token in order to attest boot state to another device☆207Updated last year
- Intuitive Quantum Computation and Post-Quantum Cryptography☆63Updated 3 years ago
- ☆15Updated 7 years ago
- The secure messaging summit information☆20Updated 4 years ago