CryptoExperts / million-dollar-curve
β88Updated 9 years ago
Alternatives and similar repositories for million-dollar-curve:
Users that are interested in million-dollar-curve are comparing it to the libraries listed below
- A public database for software and firmware hashesβ214Updated 8 years ago
- π Simple perfect xor encryption cipher πβ62Updated 8 years ago
- Chair and the Keyβ65Updated 9 years ago
- Totally Isolated TLS Unwrapping Serverβ111Updated 4 years ago
- Tools and ideas to help with PGP keys and fingerprint verificationβ58Updated last year
- ZeroDB server and client-side example of using itβ135Updated 8 years ago
- Pretty Curved Privacyβ122Updated 7 years ago
- Some code to bruteforce OpenBSD softraid encrypted drives - NOT A READY-TO-USE TOOLβ59Updated 8 years ago
- Configures a regular ubuntu server to run as a tor hidden server running apache utilising ansibleβ41Updated 6 years ago
- PGP-like encryption + torrent-like addressing + blockchain-like enforcement of data expiryβ123Updated 7 years ago
- WARNING: Deprecated! See Privacy Passβ98Updated 8 years ago
- Reference implementations (software)β85Updated 8 years ago
- β55Updated 9 years ago
- Memory-hard scheme Argon2β202Updated 4 years ago
- HTTP frameworkβ48Updated 7 years ago
- Certification using the Blockchainβ41Updated 10 years ago
- A Password hash storage scheme that prevents an attacker from cracking passwords individually and efficiently.β323Updated 7 years ago
- A Python port of the triplesec library.β81Updated last year
- β57Updated 8 years ago
- Links to stuff arising from or related to the HACS workshop.β35Updated 7 years ago
- Various cryptographic backdoors and tools to detect themβ21Updated 9 years ago
- Open Database of Firmware Test Resultsβ150Updated 8 years ago
- Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLSβ118Updated 7 years ago
- return-to-abort() - Using code introspection to prevent stack-smashingβ37Updated 4 years ago
- a tiny, custom launcher that handles namespacing, control groups, chroot'ing, and moreβ55Updated 2 years ago
- Use some TLS servers for trusted timestampingβ42Updated 9 years ago
- Provably Anonymous Overlayβ324Updated 10 years ago
- Constant-Time Toolkitβ295Updated 6 years ago
- A python implementation of the Axolotl ratchet protocol.β71Updated 7 years ago
- As a proof-of-concept, we will show how easy it is to revoke a self-signed certificate using the bitcoin blockchain. This will also demonβ¦β120Updated 9 years ago