defuse / ictmLinks
A user-first approach to threat modeling.
☆17Updated last month
Alternatives and similar repositories for ictm
Users that are interested in ictm are comparing it to the libraries listed below
Sorting:
- ☆10Updated 6 years ago
- free crypto audit☆31Updated 8 years ago
- A design for doing more private Signal groups using anonymous credentials based on algebraic MACs.☆14Updated 5 years ago
- misc stuff☆19Updated 8 years ago
- Supporting materials for our EuroS&P paper: Automated Verification for Secure Messaging Protocols and their Implementations: A Symbolic a…☆36Updated 3 years ago
- reading lists☆31Updated 6 years ago
- repository for tracking open tasks☆18Updated 7 years ago
- Mirror of freehaven's anonymous research bibliography☆14Updated 10 years ago
- A simple cryptosystem that provides provable plausibly deniable encryption.☆89Updated 6 years ago
- QubesOS dom0 automation in Python☆12Updated 7 years ago
- Secure multiparty messaging (kindof)☆21Updated 9 years ago
- A coding challenge to learn Rust☆14Updated 7 years ago
- Mix Network Bibliography☆15Updated 5 years ago
- Experimental High Assurance Cryptographic Library☆20Updated 9 years ago
- specification and design documents☆54Updated 2 years ago
- Tor relay nearest neighbour ranking☆10Updated 3 years ago
- secure messaging, file-transfer, and directory synchronization☆41Updated 7 years ago
- Signature scheme submitted to NIST's Post-Quantum Cryptography Project☆28Updated 7 years ago
- Python code for 1) permuting randomly-generated passwords for easier entry on mobile devices, and 2) for estimating entropy lost as a res…☆16Updated 9 years ago
- Leave no chance to Surveillance Capitalism and let this extension make decisions for you☆29Updated 6 years ago
- axolotl based on libsodium☆22Updated 8 years ago
- Docker environment that contains a Database, Monitor, Observatory and Analyzer☆14Updated 3 years ago
- ☆11Updated 4 years ago
- The anonymous credentials zoo☆16Updated 4 years ago
- a collection of teaching resources☆12Updated 7 years ago
- A machine learning data analysis pipeline for analyzing website fingerprinting attacks and defenses.☆30Updated 8 years ago
- Python implementation of the Sphinx mix format. - Paper: http://www.cypherpunks.ca/~iang/pubs/Sphinx_Oakland09.pdf☆15Updated 5 years ago
- Signature scheme submitted to NIST's Post-Quantum Cryptography Project☆75Updated 7 years ago
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆28Updated 7 years ago
- ☆29Updated 10 years ago