dmbb / ProtozoaLinks
Code for the paper "Poking a Hole in the Wall: Efficient Censorship-Resistant Internet Communications by Parasitizing on WebRTC" [ACM SIGSAC CCS '20]
☆24Updated 5 years ago
Alternatives and similar repositories for Protozoa
Users that are interested in Protozoa are comparing it to the libraries listed below
Sorting:
- Security model and verified implementation of QUIC packet encryption in Low*, built over EverCrypt and EverParse.☆13Updated 2 months ago
- Differential Address Trace Analysis☆60Updated last year
- Reference implementations of post-quantum cryptographic primitives☆32Updated 2 months ago
- The Internet censorship bibliography.☆153Updated 2 months ago
- ☆28Updated 3 years ago
- Go Trusted Execution Environment (TEE)☆135Updated 2 months ago
- An easy-to-use and open-source tool for differential, linear, differential-linear, and integral analysis of S-boxes☆31Updated this week
- Main source code repository of the Tamarin prover for security protocol verification.☆480Updated 3 weeks ago
- XRD: Scalable messaging system with cryptographic privacy.☆13Updated 4 years ago
- Teaching materials related to the Tamarin Prover☆71Updated last year
- The Scyther Tool for the symbolic analysis of security protocols☆106Updated last month
- Implementation of indistinguishability obfuscation constructions from scientific literature☆48Updated 10 years ago
- ABE GPSW scheme using BLS pairing implemented in Rust.☆15Updated 2 years ago
- TLS-Anvil, a fully automated TLS testsuite for client and servers.☆98Updated last month
- A tool to generate realistic private Tor network models, run them in Shadow, and analyze the results.☆39Updated last month
- Models for authenticated key exchange in Tamarin☆12Updated 6 years ago
- A Python framework for creating emulation of the Internet.☆259Updated last week
- Crypto library☆66Updated last week
- QARMA block cipher in C☆31Updated 3 years ago
- Sample implementations of the attacks shown in https://eprint.iacr.org/2020/1456☆21Updated 3 years ago
- Oblivious Pseudorandom Functions (OPRFs) using Prime-Order Groups☆38Updated last year
- NIST Lightweight Cryptography Primitives☆54Updated 3 years ago
- A microarchitectural leakage detection framework using dynamic instrumentation.☆78Updated 4 months ago
- Datasets and code for IMC'19 paper on information exposure from IoT devices☆67Updated last year
- Formal Analysis of the PQXDH Protocol☆27Updated last year
- Randomly generate a C (or javascript) program☆36Updated 7 years ago
- CADO-NFS is a complete implementation in C/C++ of the Number Field Sieve (NFS) algorithm for factoring integers. For official releases, p…☆28Updated 5 years ago
- Mirror of all PDFs from the IACR's eprint☆47Updated last year
- Implementation and simulations for the "Reducing Metadata Leakage from Encrypted Data and Communication with PURBs" paper☆30Updated 2 years ago
- ☆12Updated last year