defuse / ictmLinks
A user-first approach to threat modeling.
☆17Updated 2 months ago
Alternatives and similar repositories for ictm
Users that are interested in ictm are comparing it to the libraries listed below
Sorting:
- repository for tracking open tasks☆18Updated 7 years ago
- Supporting materials for our EuroS&P paper: Automated Verification for Secure Messaging Protocols and their Implementations: A Symbolic a…☆36Updated 3 years ago
- A design for doing more private Signal groups using anonymous credentials based on algebraic MACs.☆14Updated 5 years ago
- QubesOS dom0 automation in Python☆12Updated 7 years ago
- Signature scheme submitted to NIST's Post-Quantum Cryptography Project☆28Updated 7 years ago
- A coding challenge to learn Rust☆14Updated 7 years ago
- reading lists☆31Updated 6 years ago
- Oblivious Pseudorandom Functions (OPRFs) using Prime-Order Groups☆38Updated 10 months ago
- specification and design documents☆54Updated 2 years ago
- Mix Network Bibliography☆15Updated 5 years ago
- misc stuff☆19Updated 8 years ago
- MLS architecture☆72Updated 3 months ago
- a collection of teaching resources☆12Updated 7 years ago
- Signature scheme submitted to NIST's Post-Quantum Cryptography Project☆75Updated 7 years ago
- free crypto audit☆31Updated 8 years ago
- 🎄🖋 A Rust implementation of Merkle signing☆15Updated 5 years ago
- Rust bindings and key exchange for liboqs (Open Quantum Safe), a library for quantum-resistant cryptographic algorithms☆36Updated 4 years ago
- A simple cryptosystem that provides provable plausibly deniable encryption.☆89Updated 6 years ago
- Secure multiparty messaging (kindof)☆21Updated 9 years ago
- secure messaging, file-transfer, and directory synchronization☆41Updated 7 years ago
- mixminion is the main implementation of the Type III ("Mixminion") remailer protocol.☆60Updated 12 years ago
- The secure messaging summit information☆20Updated 4 years ago
- ☆10Updated 6 years ago
- A privacy preserving contact tracing design to battle infectious diseases☆28Updated 5 years ago
- tunnel traffic through a genuine bittorrent connection☆65Updated 5 years ago
- Keyname format for public-key fingerprints☆22Updated 11 years ago
- XChaCha8Blake3Siv is a nonce-reuse misuse-resistant (NRMR) and key-committing authenticated encryption with associated data (AEAD) algori…☆17Updated 3 years ago
- Implementation and simulations for the "Reducing Metadata Leakage from Encrypted Data and Communication with PURBs" paper☆30Updated last year
- ☆18Updated last year
- Freely available cryptographic iconography☆66Updated 8 years ago