dmbb / ProtozoaLinks
Code for the paper "Poking a Hole in the Wall: Efficient Censorship-Resistant Internet Communications by Parasitizing on WebRTC" [ACM SIGSAC CCS '20]
☆25Updated 5 years ago
Alternatives and similar repositories for Protozoa
Users that are interested in Protozoa are comparing it to the libraries listed below
Sorting:
- XRD: Scalable messaging system with cryptographic privacy.☆14Updated 5 years ago
- Security model and verified implementation of QUIC packet encryption in Low*, built over EverCrypt and EverParse.☆13Updated 5 months ago
- Fastgcd is a C implementation of an efficient algorithm to compute the pairwise GCDs of a collection of integers. The algorithm is due to…☆17Updated last year
- GPU code for the first SHA-1 collision attack and two freestart attacks☆14Updated 5 years ago
- ☆28Updated 4 years ago
- Go Trusted Execution Environment (TEE)☆148Updated 5 months ago
- Deanonymizing Tor or VPN users with website fingerprinting and machine learning.☆97Updated last year
- Reference implementations of post-quantum cryptographic primitives☆33Updated 5 months ago
- Demonstrates iterative FGSM on Apple's NeuralHash model.☆16Updated 4 years ago
- CADO-NFS is a complete implementation in C/C++ of the Number Field Sieve (NFS) algorithm for factoring integers. For official releases, p…☆30Updated 5 years ago
- Differential Address Trace Analysis☆63Updated last year
- A Python framework for creating emulation of the Internet.☆265Updated last week
- A tool to generate realistic private Tor network models, run them in Shadow, and analyze the results.☆41Updated last month
- Datasets and code for IMC'19 paper on information exposure from IoT devices☆67Updated last year
- Crypto library☆67Updated 2 months ago
- The Internet censorship bibliography.☆157Updated last month
- An easy-to-use and open-source tool for differential, linear, differential-linear, and integral analysis of S-boxes☆35Updated 3 weeks ago
- Implementation of https://eprint.iacr.org/2021/232☆93Updated 4 years ago
- Differential fuzzing for elliptic curves☆24Updated 2 years ago
- ☆28Updated 3 years ago
- Teaching materials related to the Tamarin Prover☆71Updated last year
- The Scyther Tool for the symbolic analysis of security protocols☆107Updated 5 months ago
- QARMA block cipher in C☆31Updated 3 years ago
- Automatic Discrepancy Discovery for DPI Elusion☆258Updated 5 years ago
- NIST Lightweight Cryptography Primitives☆54Updated 3 years ago
- Vault Exploit Defense☆127Updated last year
- A programming language to write bitsliced ciphers☆59Updated last year
- This repo includes the artifacts for the NDSS 2025 paper "Wallbleed: A Memory Disclosure Vulnerability in the Great Firewall of China": h…☆50Updated 11 months ago
- ☆22Updated last year
- Formal Analysis of the PQXDH Protocol☆30Updated last year