Standalone McEliece implemetation
☆13Feb 11, 2017Updated 9 years ago
Alternatives and similar repositories for BitPunch
Users that are interested in BitPunch are comparing it to the libraries listed below
Sorting:
- Web application for the LEAP platform, providing user management, tickets, billing, and REST API. Uses CouchDB for data storage, written …☆30Jan 31, 2018Updated 8 years ago
- Facial Recognition and Steganography☆10Oct 26, 2019Updated 6 years ago
- Go package to connect to Ledger devices☆19Updated this week
- code for UniK Hub backend☆10Aug 22, 2016Updated 9 years ago
- Compressed Bloom Filters (Golomb-compressed sequences, with indices)☆17May 19, 2013Updated 12 years ago
- Cross-Domain DPA Attack on SAML11☆17Jul 14, 2019Updated 6 years ago
- Mirror of https://gitlab.redox-os.org/redox-os/netutils☆29Dec 18, 2025Updated 3 months ago
- TEA cipher in CBC mode written in DRAKON Editor + C as a fun exercise.☆15Jun 6, 2012Updated 13 years ago
- Generic anonymous routing protocol framework agnostic to encryption algorithm and transport layer☆15Jun 16, 2018Updated 7 years ago
- Instruction and files for porting Arm DesignStart to CW305.☆16Dec 6, 2023Updated 2 years ago
- An AVX/AVX2/x64/pure-Go implementation of the ChaCha20 stream cipher for Golang. [Deprecated].☆11Mar 15, 2018Updated 8 years ago
- Mirror of https://gitlab.redox-os.org/redox-os/extrautils☆30Dec 22, 2025Updated 2 months ago
- Hide secret information in typographical errors☆31Dec 4, 2015Updated 10 years ago
- USB library for ChipWhisperer devices☆15Jan 22, 2026Updated last month
- A Practical Ring Learning With Errors (RingLWE) Implementation containing New Hope and Peikert reconciliation for Prime and Power-of-2 ca…☆36May 30, 2018Updated 7 years ago
- XRD: Scalable messaging system with cryptographic privacy.☆14Nov 9, 2020Updated 5 years ago
- Some Go cryptography routines that are not included in the Go standard library.☆33May 13, 2024Updated last year
- Images of Teardowns (CC BY licensed)☆12Jul 7, 2021Updated 4 years ago
- High Assurance Cryptographic Software☆10Dec 23, 2025Updated 2 months ago
- A privacy-preserving digital version of punch cards used in store loyalty programs☆11Apr 19, 2021Updated 4 years ago
- Restart unhealthy containers based on healthchecks☆10Jul 8, 2016Updated 9 years ago
- backs up everything github knows about a repository, to the repository☆12Feb 15, 2012Updated 14 years ago
- A CommonMark parser and HTML generator for Go☆16Sep 19, 2016Updated 9 years ago
- the independent voting booth for Helios☆17May 18, 2021Updated 4 years ago
- Hack conventional scales to connect to computer via usb serial and/or bluetooth☆16Feb 18, 2020Updated 6 years ago
- Example web application for WebAuthn authentication presentation☆21Feb 28, 2020Updated 6 years ago
- Implementation of cryptographic primitives in Go☆13Mar 13, 2023Updated 3 years ago
- mruby WebAssembly using WebIDL☆11Nov 28, 2019Updated 6 years ago
- A general purpose router for Kubernetes.☆15Feb 2, 2017Updated 9 years ago
- Models for authenticated key exchange in Tamarin☆12Oct 9, 2019Updated 6 years ago
- Scripts para configurar servidor de DNS nos vários sistemas operativos☆11Jan 6, 2016Updated 10 years ago
- Notes relating to secure messaging☆20Jun 11, 2016Updated 9 years ago
- XMSS[MT] commandline tool☆13Dec 18, 2023Updated 2 years ago
- RTSA-API-Samples☆14Jun 4, 2025Updated 9 months ago
- Higher-order Masking of AES-128 based on the Rivain and Prouff method, CPRR method and Common Shares with Random Reduction method.☆14May 13, 2017Updated 8 years ago
- Ansible Deflect configuration automation☆20Aug 16, 2022Updated 3 years ago
- Solution to harden TLS security by storing private keys and delegating operations to the Trused Execution Environment☆13Oct 10, 2022Updated 3 years ago
- The Plesk Security Advisor Extension is a simple extension for Plesk that allows you to secure all your websites with SSL at one single c…☆11Oct 16, 2020Updated 5 years ago
- ☆26Mar 26, 2014Updated 11 years ago