CryptoExperts / million-dollar-curveLinks
☆89Updated 9 years ago
Alternatives and similar repositories for million-dollar-curve
Users that are interested in million-dollar-curve are comparing it to the libraries listed below
Sorting:
- A public database for software and firmware hashes☆215Updated 8 years ago
- Memory-hard scheme Argon2☆206Updated 4 years ago
- Pretty Curved Privacy☆122Updated 8 years ago
- ZeroDB server and client-side example of using it☆136Updated 9 years ago
- Totally Isolated TLS Unwrapping Server☆111Updated 4 years ago
- 🔒 Simple perfect xor encryption cipher 🔒☆62Updated 8 years ago
- Noise Specification☆459Updated 6 years ago
- WARNING: Deprecated! See Privacy Pass☆99Updated 8 years ago
- PGP-like encryption + torrent-like addressing + blockchain-like enforcement of data expiry☆122Updated 8 years ago
- Tools and ideas to help with PGP keys and fingerprint verification☆58Updated last year
- A Password hash storage scheme that prevents an attacker from cracking passwords individually and efficiently.☆322Updated 8 years ago
- Reference implementations (software)☆85Updated 8 years ago
- chkboot is a tool to help detect changes to an unencrypted /boot partition.☆151Updated 4 years ago
- ☆57Updated 9 years ago
- TLS Library in python☆237Updated 3 years ago
- Open Database of Firmware Test Results☆150Updated 9 years ago
- Chair and the Key☆64Updated 10 years ago
- Provably Anonymous Overlay☆323Updated 10 years ago
- How to backdoor Diffie-Hellman☆614Updated 9 years ago
- ☆29Updated 2 years ago
- Educational SSH client☆124Updated 9 years ago
- Pbd is a Python module to disassemble serialized protocol buffers descriptors (https://developers.google.com/protocol-buffers/).☆86Updated 4 years ago
- Constant-Time Toolkit☆298Updated 7 years ago
- Some code to bruteforce OpenBSD softraid encrypted drives - NOT A READY-TO-USE TOOL☆58Updated 9 years ago
- SC4 - Strong Crypto for Mere Mortals☆122Updated 4 years ago
- An experimental version of the BQ client which adds client-side encryption☆175Updated 7 years ago
- ☆58Updated 8 years ago
- The "Intel x86 considered harmful" paper☆199Updated 9 years ago
- A python implementation of the Axolotl ratchet protocol.☆71Updated 8 years ago
- return-to-abort() - Using code introspection to prevent stack-smashing☆37Updated 4 years ago