CryptoExperts / million-dollar-curveLinks
☆89Updated 9 years ago
Alternatives and similar repositories for million-dollar-curve
Users that are interested in million-dollar-curve are comparing it to the libraries listed below
Sorting:
- A public database for software and firmware hashes☆215Updated 8 years ago
- Reference implementations (software)☆85Updated 8 years ago
- Tools and ideas to help with PGP keys and fingerprint verification☆58Updated last year
- ZeroDB server and client-side example of using it☆136Updated 8 years ago
- PGP-like encryption + torrent-like addressing + blockchain-like enforcement of data expiry☆122Updated 8 years ago
- Some code to bruteforce OpenBSD softraid encrypted drives - NOT A READY-TO-USE TOOL☆58Updated 8 years ago
- Pretty Curved Privacy☆122Updated 7 years ago
- WARNING: Deprecated! See Privacy Pass☆98Updated 8 years ago
- Chair and the Key☆64Updated 9 years ago
- Configures a regular ubuntu server to run as a tor hidden server running apache utilising ansible☆41Updated 6 years ago
- Links to stuff arising from or related to the HACS workshop.☆34Updated 7 years ago
- A python implementation of the Axolotl ratchet protocol.☆71Updated 7 years ago
- Memory-hard scheme Argon2☆204Updated 4 years ago
- 🔒 Simple perfect xor encryption cipher 🔒☆62Updated 8 years ago
- Open Database of Firmware Test Results☆150Updated 9 years ago
- Totally Isolated TLS Unwrapping Server☆111Updated 4 years ago
- Jump to Full Encryption☆61Updated 8 years ago
- chkboot is a tool to help detect changes to an unencrypted /boot partition.☆147Updated 4 years ago
- netcat that takes unfair advantage of traffic shaping systems that don't initially ratelimit☆2Updated 4 years ago
- Provably Anonymous Overlay☆324Updated 10 years ago
- ☆58Updated 8 years ago
- Hazmat ECC arithmetic for Cryptography.io☆28Updated 5 years ago
- A set of PS4 experiments using the WebKit exploit☆83Updated 9 years ago
- Index of websites publishing bugs along the lines of heartbleed.com☆40Updated 7 years ago
- Noise Specification☆455Updated 6 years ago
- IP-format-preserving encryption, with a dedicated 4-byte cipher☆106Updated 4 years ago
- Use some TLS servers for trusted timestamping☆42Updated 9 years ago
- The "State considered harmful" paper☆106Updated 9 years ago
- Software for "Quantum-Resistant Cryptosystems from Supersingular Elliptic Curve Isogenies"☆89Updated 5 years ago
- ☆55Updated 9 years ago