☆12Mar 1, 2023Updated 3 years ago
Alternatives and similar repositories for post-quantum-state-leakage-secure-ake
Users that are interested in post-quantum-state-leakage-secure-ake are comparing it to the libraries listed below
Sorting:
- I-D that describes the algorithm identifiers for NIST's PQC ML-DSA for use in the Internet X.509 Public Key Infrastructure☆14Oct 30, 2025Updated 4 months ago
- Bottom-up memory-safety for assembly language using symbolic execution☆17Feb 19, 2026Updated 2 weeks ago
- (Oblivious) DoH Server☆26Feb 21, 2022Updated 4 years ago
- ☆23Apr 5, 2025Updated 11 months ago
- App for diabetics to easily remind them about measuring sugar level after selected time. Created on request of my diabetic friend.☆15Jan 15, 2024Updated 2 years ago
- A self-hosted, privacy-focused publishing platform for autonomous and independent newsrooms.☆34Jan 12, 2025Updated last year
- Project repository for "Evaluating the persuasive influence of political microtargeting with large language models" by Kobi Hackenburg an…☆11Jun 19, 2024Updated last year
- Exploration of NIST post-quantum signatures on-ramp candidates☆38Jun 1, 2025Updated 9 months ago
- Mobile camera-based application that attempts to alter photos to preserve their utility to humans while making them unusable for facial r…☆34Apr 21, 2023Updated 2 years ago
- Materijali za vežbe iz predmeta Internet softverske arhitekture, Katedra za informatiku na Fakultetu tehničkih nauka u Novom Sadu☆11Nov 12, 2023Updated 2 years ago
- Proof of concept for an anti-phishing browser plugin, working by comparing pages screenshots with perceptual hashing algorithms.☆10Apr 3, 2022Updated 3 years ago
- OpenSelfie is an Open Source (hardware and software) photobooth based on the Raspberry Pi and Wyolum's AlaMode☆15Oct 15, 2015Updated 10 years ago
- Sage Math recompiled to run on the Raspberry Pi☆15Oct 9, 2015Updated 10 years ago
- Get advice for the best post-quantum cryptography algorithm for your use case☆17Feb 27, 2026Updated last week
- A collection of post-quantum cryptographic algorithms (and emerging standards) implemented in Rust.☆16Jul 18, 2025Updated 7 months ago
- Ask AI to test your website with a specific goal☆15Dec 22, 2023Updated 2 years ago
- repo for CIS 371 Spring 2018☆15Apr 14, 2018Updated 7 years ago
- ☆12Nov 25, 2018Updated 7 years ago
- Protect Your Secrets. Forever. Ultra-secure notes powered by blockchain.☆14Feb 21, 2026Updated 2 weeks ago
- Cloud Security Automation☆14Dec 2, 2020Updated 5 years ago
- MySQL UDF for inserting data into MongoDB☆16Feb 3, 2012Updated 14 years ago
- Encrypted Messaging Protocol Reference Implementation☆26Nov 14, 2017Updated 8 years ago
- ESP32_CAM meets Etch-A-Sketch => Etch-a-Selfie☆12Jul 30, 2019Updated 6 years ago
- ☆10Oct 6, 2020Updated 5 years ago
- Implementation of cryptographic primitives in Go☆13Mar 13, 2023Updated 2 years ago
- Mender over-the-air software updater client for microcontrollers (MCUs).☆17Updated this week
- Halite 3 reloader☆12Dec 15, 2018Updated 7 years ago
- Tamarin proof for the KEMTLS protocol using the multi-stage AKE model☆13Apr 19, 2023Updated 2 years ago
- sample implementation of deeploco☆15Nov 5, 2018Updated 7 years ago
- Landlock configuration library☆22Nov 28, 2025Updated 3 months ago
- Assembler tinkering happens here. All your bytes are belong to us.☆13May 6, 2017Updated 8 years ago
- ☆12Sep 28, 2025Updated 5 months ago
- [AAAI 2024] DataElixir: Purifying Poisoned Dataset to Mitigate Backdoor Attacks via Diffusion Models☆12Dec 5, 2024Updated last year
- An application that generates art by inserting text at random points in the image file.☆12Apr 4, 2012Updated 13 years ago
- Config files for my GitHub profile.☆15Feb 13, 2026Updated 3 weeks ago
- Secure decentralized hierarchical coordination platform☆22Nov 19, 2022Updated 3 years ago
- XMSS[MT] commandline tool☆13Dec 18, 2023Updated 2 years ago
- ☆12Jan 17, 2026Updated last month
- Set up your own CTF with NIZKCTF☆14Oct 20, 2017Updated 8 years ago