encryptedsystems / Searchable-Signal-Android
A version of OpenWhisper System's Signal App with secure message search (built with Clusion)
☆20Updated 7 years ago
Related projects: ⓘ
- ☆57Updated 7 years ago
- FLECC_IN_C is a FLexible Elliptic Curve Cryptography library written IN C☆17Updated 6 years ago
- Abusing U2F to 'store' a stable secret☆16Updated 8 years ago
- ☆38Updated this week
- ☆14Updated this week
- Docker environment that contains a Database, Monitor, Observatory and Analyzer☆14Updated 2 years ago
- Mirror of http://sourceforge.net/p/ed448goldilocks/code/ci/master/tree/☆32Updated 9 years ago
- Security and Privacy Assurance Research Test and Assessment (SPARTA) tool suite☆36Updated 7 years ago
- An implementation of the axolotl ratchet based on libsodium.☆23Updated last year
- Experiments in high-assurance crypto.☆46Updated last year
- An Implementation of the Fully Homomorphic Smart-Vercauteren Cryptosystem☆43Updated 9 years ago
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆27Updated 6 years ago
- misc stuff☆19Updated 7 years ago
- An implementation of the OPAQUE password-authenticated key exchange protocol☆10Updated last week
- Applet for testing ecc curves☆25Updated 5 years ago
- Symmetric somewhat homomorphic encryption library based on DGHV☆26Updated 7 years ago
- A cryptographic method that defends against side-channel attacks☆24Updated 7 years ago
- CoSi command line interface☆21Updated 7 years ago
- Links to stuff arising from or related to the HACS workshop.☆35Updated 6 years ago
- Scripts that I used to write a blog post about section 7.24.1(2) of C11☆11Updated 8 years ago
- Proof-of-concept allowing you to prevent/block browser fingerprinting (ESORICS 2015).☆20Updated 9 years ago
- TLS Is Not For Obligatory Interception Lovers☆35Updated 2 years ago
- Stores Chromium Channel ID private keys in an Intel SGX enclave.☆33Updated 8 years ago
- SIDH C reference implementation☆13Updated 7 years ago
- CryptoBib Main Repository for Developers☆18Updated last month
- Distributed, tamper-resistant circumvention tools☆48Updated 8 years ago
- A CONIKS implementation in Java☆60Updated 5 years ago
- ☆32Updated 3 years ago
- APRICOT: Advanced Protocols for Real-world Implementation of Computational Oblivious Transfers☆15Updated 7 years ago
- paxrat is a utility to set PaX flags on a set of binaries.☆34Updated 6 years ago