nindalf / cryptoLinks
Crypto code and notes
☆16Updated 10 years ago
Alternatives and similar repositories for crypto
Users that are interested in crypto are comparing it to the libraries listed below
Sorting:
- TLS Library in python☆237Updated 3 years ago
- Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS☆119Updated 8 years ago
- A repository that aims to provide tools for cryptography and cryptanalysis☆218Updated 5 years ago
- Symmetric somewhat homomorphic encryption library based on DGHV☆27Updated 8 years ago
- Tool to automatically search for linear characteristics☆39Updated 10 years ago
- ☆145Updated 9 months ago
- ☆15Updated 7 years ago
- ☆33Updated 4 years ago
- A python library that implements a number of Privacy Enhancing Technolgies☆135Updated 3 years ago
- A browsable archive of all Underhanded Crypto Contest entries.☆35Updated 6 years ago
- ☆454Updated 2 years ago
- This is a toy implementation in Go of Manger's chosen-ciphertext attack on RSA-OAEP☆31Updated 7 years ago
- Timing Attack on TLS' ECDSA signature☆46Updated 10 years ago
- ☆52Updated 8 years ago
- Factoring as a Service☆275Updated 7 months ago
- Source code of the Whitebox Contest Submission Server☆34Updated last year
- Implementations of the Simon and Speck Block Ciphers☆101Updated 7 years ago
- msieve - Number Field Sieve implementation by Jason Papadopoulos☆261Updated 2 years ago
- ☆170Updated 4 years ago
- A party game for nerdy cryptographers. Shamelessly based on Cards Against Humanity.☆324Updated 5 years ago
- An easy to use tool for cryptanalysis of symmetric primitives based on SMT/SAT solvers.☆103Updated 2 years ago
- Software for "Quantum-Resistant Cryptosystems from Supersingular Elliptic Curve Isogenies"☆88Updated 6 years ago
- Checking that functions are constant time with Valgrind☆196Updated 8 years ago
- Implementation of ECDAA☆23Updated 8 years ago
- DEPRECATED – See NOTICE below about migration to new repository – Post-quantum key exchange from the ring learning with errors problem☆60Updated 9 years ago
- Lecture notes for a course on cryptography☆569Updated 2 years ago
- The Tor Path Simulator☆87Updated 9 years ago
- Secretgrind: a Valgrind analysis tool to detect secrets in memory☆61Updated 9 years ago
- Python implementations of FIPS 203,204,205 (+ python wrappers for NIST's ACVP-Server crypto code)☆60Updated 7 months ago
- How to backdoor Diffie-Hellman☆612Updated 9 years ago