ConradIrwin / gpg-decoderLinks
A port of the awesome ASN.1 Javascript Decoder for GPG messages
☆59Updated 2 years ago
Alternatives and similar repositories for gpg-decoder
Users that are interested in gpg-decoder are comparing it to the libraries listed below
Sorting:
- A PGP packet visualizer☆183Updated 9 months ago
- proof of concept on using pgp keyservers for file storage☆59Updated 6 years ago
- Jitterentropy RNGd☆98Updated last month
- Regenerable ed25519 keys for OpenSSH and OpenPGP.☆36Updated 5 years ago
- Sphinx-based Password Storage low-level library☆130Updated 6 months ago
- Fault attack agaisnt EdDSA demonstrated on an Arduino Nano board, allowing for partial key recovery and fake signatures.☆72Updated 7 years ago
- Ed25519 vanity public key generator☆50Updated 3 years ago
- Fork of B. Poettering's SSSS (Shamir's Secret Sharing Scheme)☆90Updated 2 months ago
- An investigation into Jacob Appelbaum leaving the Tor Project☆98Updated last year
- A memory-hard password hashing function.☆70Updated 2 years ago
- Deterministic/nonce-reuse resistant authenticated encryption scheme using XChaCha20, implemented on libsodium.☆30Updated last year
- Mirror of a website on Elligator by Daniel J. Bernstein, Mike Hamburg, Anna Krasnova, and Tanja Lange☆17Updated 4 months ago
- Making art with SSH key randomart☆144Updated 7 years ago
- Abusing U2F to 'store' a stable secret☆16Updated 9 years ago
- generate pgp keys with vanity fingerprints☆18Updated 8 years ago
- Like Tor2Web, but not just HTTP ( using IPv6 )☆127Updated 4 years ago
- The DANE fail list☆15Updated 5 years ago
- An Internet-Draft for the Balloon Key Derivation Function (BKDF), a memory-hard password hashing and password-based key derivation functi…☆11Updated last month
- RNP: high performance C++ OpenPGP library used by Mozilla Thunderbird☆215Updated 2 months ago
- Display SHA-256 as PGP words☆21Updated 2 years ago
- ☆12Updated 7 months ago
- ☆37Updated 8 years ago
- ☆82Updated 5 years ago
- PUREE: Password-based Uniform-Random-Equivalent Encryption☆64Updated 5 years ago
- Discusses how to verify DKIM signatures in old emails, namely one of the Hunter Biden emails in the news☆101Updated 2 years ago
- [Feature complete] SHA-3 and Keccak checksum utility☆177Updated 10 months ago
- Tool to verify DKIM signatures on an mbox of emails☆96Updated 7 years ago
- Use a TPM to store a TOTP token in order to attest boot state to another device☆16Updated 2 years ago
- Command line program for secret-sharing strings☆78Updated 2 years ago
- Bootstrapping Secure Communication without Leaking Metadata☆77Updated 5 years ago