ctz / u2f-secret-storageLinks
Abusing U2F to 'store' a stable secret
☆16Updated 9 years ago
Alternatives and similar repositories for u2f-secret-storage
Users that are interested in u2f-secret-storage are comparing it to the libraries listed below
Sorting:
- Use a TPM to store a TOTP token in order to attest boot state to another device☆209Updated 2 years ago
- free crypto audit☆31Updated 8 years ago
- ☆10Updated 7 years ago
- Docker environment that contains a Database, Monitor, Observatory and Analyzer☆14Updated 4 years ago
- WARNING: Deprecated! See Privacy Pass☆99Updated 8 years ago
- Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS☆120Updated 8 years ago
- Random tools to perform Certificate Transparency-related stuff. Unmaintained and maybe broken☆27Updated 7 years ago
- U2F toolset☆20Updated 2 years ago
- Experimental High Assurance Cryptographic Library☆20Updated 9 years ago
- GRand Unified Bootloader http://www.gnu.org/software/grub/grub.html☆38Updated 8 years ago
- IP-format-preserving encryption, with a dedicated 4-byte cipher☆107Updated 4 years ago
- Mirror of http://sourceforge.net/p/ed448goldilocks/code/ci/master/tree/☆33Updated 10 years ago
- Python utils library and tools (verify-scts, ctloglist, ...) for Certificate Transparency.☆36Updated 2 years ago
- "control-port-filter" without the bash☆14Updated 9 years ago
- Abandoned—Virtual FIDO U2F Token Chrome Extension☆62Updated 9 years ago
- A reversible DER and BER pretty-printer.☆248Updated 2 weeks ago
- Some code to duct-tape an SSH agent to a Chrome extension that implements the chrome.certificateProvider API.☆17Updated 9 years ago
- A list of certificates shipped by various vendors and Open Source Projects☆38Updated 9 years ago
- A Go implementation of the BERserk attack against Mozilla NSS ASN.1 parsing of PKCS#1 RSA signatures with e = 3. Complete of a certificat…☆95Updated 10 years ago
- Reference implementations (software)☆85Updated 9 years ago
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆28Updated 7 years ago
- salty privacy☆52Updated 5 years ago
- Checking that functions are constant time with Valgrind☆193Updated 8 years ago
- Scripts to parse and analyze pgp key server data☆33Updated 5 years ago
- A python implementation of the Axolotl ratchet protocol.☆71Updated 8 years ago
- Use a TPM to store a TOTP token in order to attest boot state to another device☆16Updated 2 years ago
- PaX exception daemon - Temporarily abandoned due to the PaX and grsecurity patches becoming private☆41Updated 8 years ago
- Does your library check TLS certificates properly?☆79Updated 2 years ago
- ☆33Updated 4 years ago
- X.509 certificate linter☆158Updated 5 years ago