Tool for generation of data from cryptoprimitives (block and stream ciphers, hash functions). Cryptoprimitives are round-reduced and the data can be configured for multiple testing scenarios.
☆14Nov 11, 2022Updated 3 years ago
Alternatives and similar repositories for CryptoStreams
Users that are interested in CryptoStreams are comparing it to the libraries listed below
Sorting:
- ☆12Aug 17, 2020Updated 5 years ago
- An automated toolkit to analyze and detect changes in secure hardware and cryptographic libraries. SCRUTINY provides high-level framework…☆16Feb 12, 2026Updated last month
- A C++ implementation of the TinyLEGO cryptographic protocol [NST17] for general secure two-party computation☆16Jun 4, 2017Updated 8 years ago
- Distinguisher of Standard & Simulated Elliptic Curves via Traits.☆18Jun 20, 2024Updated last year
- PBMX is a Rust toolkit for creating secure and fair play-by-mail games☆11Jan 20, 2023Updated 3 years ago
- Tool for analysis of security certificates and their security targets (Common Criteria, NIST FIPS140-2...).☆25Updated this week
- PassKeeper is a Windows utility that allows you to keep an encrypted list of accounts with usernames, passwords, and notes.☆13Dec 29, 2011Updated 14 years ago
- An implementation of the K Nearest Neighbors Algorithm from scratch in python (using the Iris dataset)☆10Nov 27, 2016Updated 9 years ago
- A TensorFlow Framework for Multi-Task Learning and Text Classification☆11Feb 9, 2023Updated 3 years ago
- Collection of open-source JavaCard crypto algorithms. Optimized for memory and speed with unified interface☆13Oct 6, 2024Updated last year
- A fuzzer for APDU-based smartcard interfaces☆21Mar 16, 2025Updated last year
- Tests support and behavior of elliptic curve cryptography implementations on JavaCards (TYPE_EC_FP and TYPE_EC_F2M) and in selected softw…☆85Mar 8, 2026Updated 2 weeks ago
- JavaCard project template for building CAP and running JCardSim with gradle + coverage☆19Mar 24, 2024Updated last year
- TriFlow: Triaging Android Applications using Speculative Information Flows☆13Dec 26, 2022Updated 3 years ago
- Complex multiplication based factorization☆40Feb 21, 2022Updated 4 years ago
- Mirror of PScout (http://pscout.csl.toronto.edu/).☆23Aug 25, 2014Updated 11 years ago
- Small library for JavaCard CAP file parsing and verification - MOVED to https://github.com/martinpaljak/ant-javacard☆18Nov 15, 2023Updated 2 years ago
- Performance profiler for Java Card code☆31Oct 19, 2025Updated 5 months ago
- Sample embedded defense code for applications written in .NET, Java, PHP and Python.☆11Feb 23, 2019Updated 7 years ago
- An implementation of the decoding of BCH codes resistant to timing attacks☆11Sep 18, 2020Updated 5 years ago
- Mapping of Android permissions and corresponding methods that require those permissions.☆14Oct 30, 2015Updated 10 years ago
- Multi-Agent Reinforcement Learning Environment for the card game SkyJo, compatible with PettingZoo and RLLIB☆16Feb 21, 2026Updated last month
- ☆17Feb 15, 2023Updated 3 years ago
- A list of resources for the talk Rowhammer Revisited: From Exploration to Exploitation and Mitigation☆15Dec 13, 2023Updated 2 years ago
- javacard framework in python☆19Nov 18, 2022Updated 3 years ago
- Control your jailbroken iOS device from macOS with QuickTime Player.☆11Jul 20, 2022Updated 3 years ago
- BSidesPDX CTF 2017☆11Dec 7, 2017Updated 8 years ago
- A C implementation of Spritz, a spongy RC4-like stream cipher and hash function.☆28Jan 1, 2026Updated 2 months ago
- Curated list of open-source TPM (Trusted Platform Module) applications☆28Dec 12, 2021Updated 4 years ago
- 树形结构,tree,OutlineView,树形☆10Nov 27, 2018Updated 7 years ago
- Binsec/Haunted is an extension of Binsec to verify speculative constant-time and detect Spectre attacks.☆18Oct 19, 2023Updated 2 years ago
- ☆17Aug 15, 2023Updated 2 years ago
- ☆21Aug 6, 2022Updated 3 years ago
- Randomness testing toolkit automates running and evaluating statistical testing batteries☆18Feb 16, 2024Updated 2 years ago
- Proof-of-concept implementation for the paper "Indirect Meltdown: Building Novel Side-Channel Attacks from Transient Execution Attacks" (…☆22Sep 24, 2023Updated 2 years ago
- Secure Multiparty Key Generation, Signature and Decryption javacard applet☆41Feb 15, 2025Updated last year
- Pin-Based Constant Execution Checker (Pin-based CEC)☆20Mar 31, 2025Updated 11 months ago
- Software implementation of International Data Encryption Algorithm (IDEA) cipher with 4 ciphering modes (ECB, CBC, CFB, OBF).☆20Dec 17, 2018Updated 7 years ago
- Scripts to collect microcode from CPUMicrocodes Repo and to downgrade to a compatible microcode.☆22Oct 18, 2024Updated last year