honzasp / geosick
Are you infected?
☆9Updated 4 years ago
Alternatives and similar repositories for geosick:
Users that are interested in geosick are comparing it to the libraries listed below
- Performance Evaluation of SHA-256 using SHA New Instructions.☆43Updated 3 years ago
- Automatic problem solver based on circuit-like representation and genetic programming☆13Updated 7 years ago
- ☆12Updated 4 years ago
- Use YubiKeys (or other security tokens) like a physical key☆18Updated 5 years ago
- Collection of workshop notes from Zcon0☆11Updated 6 years ago
- ☆33Updated 3 years ago
- FLECC_IN_C is a FLexible Elliptic Curve Cryptography library written IN C☆18Updated 7 years ago
- Tool for generation of data from cryptoprimitives (block and stream ciphers, hash functions). Cryptoprimitives are round-reduced and the …☆13Updated 2 years ago
- Use a TPM to store a TOTP token in order to attest boot state to another device☆15Updated last year
- A fork of floodyberry's ed25519-donna modified to support the Ristretto prime-order group☆14Updated 4 years ago
- SHA-3 implementation for 8-bit AVR☆9Updated 6 years ago
- How fast can we brute force a 64-bit comparison?☆52Updated 5 years ago
- Signature scheme submitted to NIST's Post-Quantum Cryptography Project☆28Updated 7 years ago
- A small C++17 library inspired by Category Theory.☆16Updated 2 years ago
- Multiplication using AVX512 and AVX512IFMA instructions☆23Updated 9 years ago
- Tools used to make the SHA-1 collision detection library☆12Updated 7 years ago
- Implementations of a fast Elliptic-curve Diffie-Hellman primitive☆25Updated 9 years ago
- Sample code of the OpenPGP Card☆11Updated 4 years ago
- ☆22Updated 8 years ago
- Computer Security Class - Department of Informatics and Telecommunications, University of Athens☆12Updated 8 years ago
- ☆11Updated 5 years ago
- Wrapper of the OpenSSL elliptic curve functions for easy Python manipulation☆12Updated 10 years ago
- reading lists☆31Updated 6 years ago
- Cooperative RSA signing☆26Updated 4 years ago
- Scripts that I used to write a blog post about section 7.24.1(2) of C11☆11Updated 8 years ago
- cgo wrappers around post-quantum cryptography primitives☆23Updated 6 years ago
- APRICOT: Advanced Protocols for Real-world Implementation of Computational Oblivious Transfers☆16Updated 8 years ago
- A browsable archive of all Underhanded Crypto Contest entries.☆34Updated 5 years ago
- Working Copy of the NSEC5 Specification☆15Updated 4 years ago
- Secretgrind: a Valgrind analysis tool to detect secrets in memory☆59Updated 8 years ago