ctz / u2f-secret-storageLinks
Abusing U2F to 'store' a stable secret
☆16Updated 10 years ago
Alternatives and similar repositories for u2f-secret-storage
Users that are interested in u2f-secret-storage are comparing it to the libraries listed below
Sorting:
- Use a TPM to store a TOTP token in order to attest boot state to another device☆209Updated 2 years ago
- free crypto audit☆31Updated 8 years ago
- Docker environment that contains a Database, Monitor, Observatory and Analyzer☆14Updated 4 years ago
- Experimental High Assurance Cryptographic Library☆20Updated 9 years ago
- Random tools to perform Certificate Transparency-related stuff. Unmaintained and maybe broken☆27Updated 7 years ago
- Abandoned—Virtual FIDO U2F Token Chrome Extension☆62Updated 10 years ago
- ☆10Updated 7 years ago
- A reversible DER and BER pretty-printer.☆247Updated last month
- WARNING: Deprecated! See Privacy Pass☆99Updated 8 years ago
- Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS☆120Updated 8 years ago
- Mirror of http://sourceforge.net/p/ed448goldilocks/code/ci/master/tree/☆33Updated 10 years ago
- Python utils library and tools (verify-scts, ctloglist, ...) for Certificate Transparency.☆36Updated 2 years ago
- U2F toolset☆20Updated 2 years ago
- A collection of private keys that are flawed for research purposes.☆12Updated 5 years ago
- Regenerable ed25519 keys for OpenSSH and OpenPGP.☆36Updated 6 years ago
- IP-format-preserving encryption, with a dedicated 4-byte cipher☆107Updated 4 years ago
- Cryptography code examples using libsodium and mbedtls C libraries and Python cryptography and PyNaCl modules☆71Updated 6 years ago
- Scripts to parse and analyze pgp key server data☆33Updated 5 years ago
- GRand Unified Bootloader http://www.gnu.org/software/grub/grub.html☆38Updated 8 years ago
- udev helper and rule to identify U2F tokens☆51Updated 7 years ago
- salty privacy☆52Updated 5 years ago
- Secretgrind: a Valgrind analysis tool to detect secrets in memory☆61Updated 8 years ago
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆28Updated 7 years ago
- Some code to duct-tape an SSH agent to a Chrome extension that implements the chrome.certificateProvider API.☆17Updated 9 years ago
- A Go implementation of the BERserk attack against Mozilla NSS ASN.1 parsing of PKCS#1 RSA signatures with e = 3. Complete of a certificat…☆95Updated 10 years ago
- mozilla: Firefox's X.509 certificate verification core code.☆22Updated 10 years ago
- Use a TPM to store a TOTP token in order to attest boot state to another device☆16Updated 2 years ago
- "control-port-filter" without the bash☆14Updated 9 years ago
- The multiversal cryptoengine!☆217Updated 6 years ago
- Checking that functions are constant time with Valgrind☆195Updated 8 years ago