ace0 / pythiaLinks
Pythia server (prototype) implementation
☆13Updated 7 years ago
Alternatives and similar repositories for pythia
Users that are interested in pythia are comparing it to the libraries listed below
Sorting:
- Rate Limiting using Cloud Resources☆20Updated 9 years ago
- C++ Implementation of Multivariate Quadratic FHE☆51Updated 9 years ago
- Forensics acquisition framework designed to be extensible and secure☆124Updated 6 years ago
- Implementation of ECDAA☆23Updated 8 years ago
- Certificate Transparency Log aggregation, parsing, and streaming service☆105Updated 7 years ago
- Security and Privacy Assurance Research Test and Assessment (SPARTA) tool suite☆37Updated 8 years ago
- Signature scheme submitted to NIST's Post-Quantum Cryptography Project☆74Updated 8 years ago
- An experimental version of the BQ client which adds client-side encryption☆175Updated 7 years ago
- sleepy puppy docker setup☆44Updated 7 years ago
- Examples for https://github.com/google/tink☆13Updated 7 years ago
- A decentralized privacy-preserving data sharing tool☆31Updated 4 years ago
- Varna: Quick & Cheap AWS CloudTrail Monitoring with Event Query Language (EQL)☆52Updated 2 years ago
- 🚨 Slack bot for cyber-security phishing☆21Updated 6 years ago
- Blockchains. Destruction. Mayhem.☆50Updated 3 years ago
- A CONIKS implementation in Java☆60Updated 7 years ago
- A Proxy server to create blueprint documentation☆37Updated 8 years ago
- Secret sharing library in Java for the Archistar multi-cloud storage system☆47Updated 7 years ago
- Fag ol fra mastern☆10Updated 6 years ago
- Manage your security groups using the API gateway and Lambda☆18Updated 9 years ago
- ☆170Updated 4 years ago
- Security framework for building multi-user end-to-end encrypted data storage and sharing/processing with zero leakage risks from storage …☆85Updated 3 years ago
- PrOfESSOS is our open source implementation for fully automated Evaluation-as-a-Service for SSO. PrOfESSOS introduces a generic approach …☆28Updated 2 years ago
- Stores Chromium Channel ID private keys in an Intel SGX enclave.☆33Updated 9 years ago
- ☆11Updated 2 months ago
- An Implementation of Order-Revealing Encryption☆101Updated 5 years ago
- AWS Metadata Proxy for protection against SSRF☆68Updated 5 years ago
- A warrant canary system☆30Updated 7 years ago
- tl-create is a cross-platform command line tool to create a X.509 trust list from various trust stores. (Keywords: CABFORUM, eIDAS, WebPK…☆32Updated last year
- Fault attack agaisnt EdDSA demonstrated on an Arduino Nano board, allowing for partial key recovery and fake signatures.☆73Updated 8 years ago
- ☆28Updated this week