CryptoExperts / million-dollar-curveLinks
β89Updated 9 years ago
Alternatives and similar repositories for million-dollar-curve
Users that are interested in million-dollar-curve are comparing it to the libraries listed below
Sorting:
- A public database for software and firmware hashesβ215Updated 8 years ago
- π Simple perfect xor encryption cipher πβ62Updated 8 years ago
- Pretty Curved Privacyβ122Updated 8 years ago
- ZeroDB server and client-side example of using itβ136Updated 9 years ago
- WARNING: Deprecated! See Privacy Passβ98Updated 8 years ago
- Educational SSH clientβ124Updated 9 years ago
- Provably Anonymous Overlayβ323Updated 10 years ago
- Chair and the Keyβ64Updated 9 years ago
- Memory-hard scheme Argon2β206Updated 4 years ago
- Configures a regular ubuntu server to run as a tor hidden server running apache utilising ansibleβ41Updated 6 years ago
- A Password hash storage scheme that prevents an attacker from cracking passwords individually and efficiently.β322Updated 8 years ago
- PGP-like encryption + torrent-like addressing + blockchain-like enforcement of data expiryβ122Updated 8 years ago
- chkboot is a tool to help detect changes to an unencrypted /boot partition.β149Updated 4 years ago
- Totally Isolated TLS Unwrapping Serverβ111Updated 4 years ago
- Tools and ideas to help with PGP keys and fingerprint verificationβ58Updated last year
- Noise Specificationβ457Updated 6 years ago
- Some code to bruteforce OpenBSD softraid encrypted drives - NOT A READY-TO-USE TOOLβ58Updated 8 years ago
- β55Updated 9 years ago
- Open Database of Firmware Test Resultsβ150Updated 9 years ago
- TLS Library in pythonβ237Updated 3 years ago
- A python implementation of the Axolotl ratchet protocol.β71Updated 7 years ago
- As a proof-of-concept, we will show how easy it is to revoke a self-signed certificate using the bitcoin blockchain. This will also demonβ¦β121Updated 10 years ago
- Various cryptographic backdoors and tools to detect themβ21Updated 9 years ago
- Pbd is a Python module to disassemble serialized protocol buffers descriptors (https://developers.google.com/protocol-buffers/).β86Updated 4 years ago
- Reference implementations (software)β85Updated 8 years ago
- The "Intel x86 considered harmful" paperβ199Updated 9 years ago
- Jump to Full Encryptionβ61Updated 8 years ago
- Double Ratchet Algorithmβ378Updated 9 years ago
- Chrome address spoofing vulnerability proof-of-concept for HTTPS. (Original by David Leo.)β208Updated 10 years ago
- β287Updated 9 years ago