SalusaSecondus / CryptoGotchas
A collection of common (interesting) cryptographic mistakes and learning resources.
☆319Updated 3 months ago
Related projects ⓘ
Alternatives and complementary repositories for CryptoGotchas
- Crypto Audit Guidelines☆132Updated 3 years ago
- Intuitive Advanced Cryptography☆430Updated 2 years ago
- Deployments of fancy cryptography☆125Updated 3 weeks ago
- A Course in Cryptanalysis☆132Updated last month
- Fuzzing cryptographic libraries. Magic bug printer go brrrr.☆687Updated 2 weeks ago
- A party game for nerdy cryptographers. Shamelessly based on Cards Against Humanity.☆320Updated 4 years ago
- A place for useful crypto-related resources plus some of my fav stuff☆220Updated 3 years ago
- A curated list of resources about post-quantum cryptography☆253Updated last month
- ☆81Updated 4 years ago
- Guidelines for low-level cryptography software☆1,110Updated last year
- ☆225Updated 3 months ago
- Intuitive Quantum Computation and Post-Quantum Cryptography☆62Updated 2 years ago
- Checking that functions are constant time with Valgrind☆176Updated 7 years ago
- Constant-Time Toolkit☆294Updated 6 years ago
- Community Cryptography Specification Project☆313Updated last month
- dude, is my code constant time?☆176Updated 8 months ago
- A list of the state of IETF protocols and PQC☆45Updated 5 months ago
- Sphinx-based Password Storage low-level library☆128Updated 5 months ago
- Please see https://github.com/hacspec/hax☆243Updated 9 months ago
- Main source code repository of the Tamarin prover for security protocol verification.☆419Updated this week
- TLS-Anvil, a fully automated TLS testsuite for client and servers.☆90Updated 9 months ago
- Ledger's Advanced Side-Channel Analysis Repository☆376Updated last year
- A repository that aims to provide tools for cryptography and cryptanalysis☆201Updated 4 years ago
- A Coordination repo for all things Rust Cryptography oriented☆260Updated 2 months ago
- Lecture notes for a course on cryptography☆513Updated 11 months ago
- ☆170Updated 3 years ago
- Understand and mitigate software-observable side-channels☆498Updated 3 years ago
- JHU Advanced Topics in Applied Cryptography (601.745)☆51Updated 6 years ago
- Sample implementations of the attacks shown in https://eprint.iacr.org/2020/1456☆20Updated 2 years ago
- Exploration of NIST post-quantum signatures on-ramp candidates☆23Updated 2 weeks ago