☆11May 14, 2015Updated 10 years ago
Alternatives and similar repositories for honeyencryption
Users that are interested in honeyencryption are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A new kind of password vault that fools the brute-force attacker by charning out decoy passwords.☆26Apr 30, 2021Updated 4 years ago
- ☆14Dec 3, 2025Updated 3 months ago
- Implementation for Decision-focused Summarization (EMNLP2021)☆12Mar 14, 2022Updated 4 years ago
- A Sublime Text 2 Plugin that can generate a sequence of numbers using search and replace.☆28Sep 29, 2019Updated 6 years ago
- Automated benchmarking and testing of Post-Quantum Public Key Algoritms (work in progress)☆12Jul 27, 2018Updated 7 years ago
- A lisp interpreter☆13Oct 1, 2020Updated 5 years ago
- Ted is a line oriented text editor and formatter☆12Jun 29, 2020Updated 5 years ago
- Micro Lisp Implementation in C☆11May 22, 2013Updated 12 years ago
- Simple Lisp compiler. Compiles a minimal Lisp dialect to ANSI C.☆19Jul 26, 2015Updated 10 years ago
- BGN encryption scheme implementation using Go☆16Sep 5, 2020Updated 5 years ago
- A Security Analysis of Honeywords☆16Nov 28, 2017Updated 8 years ago
- The OPE lib extracted from CryptoDb☆17Jun 3, 2016Updated 9 years ago
- Lisp implementation in Befunge☆27Feb 18, 2016Updated 10 years ago
- A functional approach to chess☆11Jan 16, 2018Updated 8 years ago
- HAL: A Library for Homomorphic Authentication☆23Apr 3, 2017Updated 8 years ago
- Proof-of-concept implementation of a homomorphic Simon encryption using YASHE and FV leveled homomorphic cryptosystems☆20Aug 8, 2015Updated 10 years ago
- Implementing LISP from the original McCarthy paper☆14Jan 15, 2017Updated 9 years ago
- ☆19Jan 12, 2022Updated 4 years ago
- A gameboy emulator written in Clojure☆13Oct 10, 2019Updated 6 years ago
- DECRYPTION DECEPTION☆12Dec 23, 2016Updated 9 years ago
- Coffee-break roguelike for Emacs☆28Dec 29, 2024Updated last year
- Info for Columbia Business School MSFE students☆19Mar 4, 2026Updated 2 weeks ago
- Dockerfile to build an image with the toolchain and other dependencies to compile software the Miyoo Custom Firmware (CFW)☆16Apr 1, 2022Updated 3 years ago
- Golang tool to pull and summarize NPM license info☆13Jan 4, 2023Updated 3 years ago
- Sample reactive Blog and Documentation website with Phoenix LiveView that adapts immediately to Markdown files and folders, powered by Pa…☆16May 3, 2024Updated last year
- UW Blockchain Society's compilation of Blockchain materials for general public.☆21Oct 28, 2020Updated 5 years ago
- A budget oriented case design for a rectangle controller using the HTangl layout☆10Aug 20, 2022Updated 3 years ago
- Code snippets and examples from jQuery UI in Action☆30Jun 17, 2016Updated 9 years ago
- Implementation of the Paper "Goal-Driven Explainable Clustering via Language Descriptions"☆40May 24, 2023Updated 2 years ago
- ☆43Oct 21, 2021Updated 4 years ago
- Implementation of the estimator for combining noisy observations from Dawid and Skene (1979)☆41Aug 23, 2014Updated 11 years ago
- HoLy is simple http library for Racket language☆12Nov 3, 2017Updated 8 years ago
- Code for a password strength meter (PSM) with CKL_PCFG models and for memory pattern recognization☆15Sep 6, 2021Updated 4 years ago
- Vulnerable rails application that is configurable in its vulnerability☆20Jun 4, 2018Updated 7 years ago
- A directory of twtxt users☆24Oct 5, 2022Updated 3 years ago
- ☆19Mar 10, 2023Updated 3 years ago
- PassBertStrengthMeter is the open source library to apply BERT model to password evaluation.☆18Dec 27, 2022Updated 3 years ago
- Code and results accompanying our paper titled Mixture Proportion Estimation and PU Learning: A Modern Approach at Neurips 2021 (Spotligh…☆45Mar 12, 2024Updated 2 years ago
- Minimal HTML 5 Presentation Platform☆23Sep 19, 2016Updated 9 years ago