dedis / prifi_archiveLinks
Work-in-progress Dissent port/rewrite for low-latency anonymous communication
☆11Updated 6 years ago
Alternatives and similar repositories for prifi_archive
Users that are interested in prifi_archive are comparing it to the libraries listed below
Sorting:
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆28Updated 7 years ago
- Tools for attacking cryptographic implementations.☆21Updated 8 years ago
- SIDH C reference implementation☆13Updated 8 years ago
- Experimental High Assurance Cryptographic Library☆20Updated 9 years ago
- axolotl based on libsodium☆22Updated 8 years ago
- Reference implementation of the BLZZRD variant of the BLISS Ring-LWE Signature Scheme☆16Updated 8 years ago
- AVX2 Chacha implementation☆16Updated 11 years ago
- FLECC_IN_C is a FLexible Elliptic Curve Cryptography library written IN C☆18Updated 7 years ago
- Experiments in high-assurance crypto.☆47Updated 2 years ago
- Signature scheme submitted to NIST's Post-Quantum Cryptography Project☆28Updated 7 years ago
- Simple application for playing with elliptic curves☆44Updated 2 years ago
- Reference implementations (software)☆85Updated 8 years ago
- a C++ embedded domain specific language for zero knowledge proofs☆59Updated 8 years ago
- ♥ ♥ ♥ Trevor's & Moxie's Axolotl Ratchet + AGL's xmpp-client ♥ ♥ ♥☆12Updated 10 years ago
- like ChaCha, but 64-bit instead of 32-bit thanks to BLAKE2b's permutation☆15Updated 8 years ago
- HILA5 KEM/DEM. Reference and Optimized Implementations + NIST PQC Submission Documents☆16Updated 7 years ago
- tunnel traffic through a genuine bittorrent connection☆65Updated 5 years ago
- System tuning recommendations for running cryptographic applications☆23Updated 8 years ago
- Please check out https://github.com/hacspec/hacspec for more information on hacspec☆46Updated 4 years ago
- Collection of test vectors for cryptographic operations☆11Updated 9 years ago
- Simulates Attacks of AB16 on Argon2i☆11Updated 8 years ago
- Secretgrind: a Valgrind analysis tool to detect secrets in memory☆61Updated 8 years ago
- a web page / paper☆18Updated 8 years ago
- Project for the Crypto subject at Uni☆18Updated 8 years ago
- Self-contained educational implementation of the BLISS-B Bimodal Lattice Signature Scheme☆14Updated 9 years ago
- Detect some forms of linux kernel tampering☆12Updated 9 years ago
- Code to fuzz bignum libraries☆45Updated 6 years ago
- Prangster tool from the Black Hat USA 2013 presentation "Black-Box Assessment of Pseudorandom Algorithms" by Derek Soeder, Christopher Ab…☆11Updated 10 years ago
- x86-64 kernel in Rust☆31Updated 8 years ago
- A fast secure userspace pseudorandom number generator☆82Updated 10 years ago