post-quantum-cryptography / post-quantum-state-leakage-secure-akeView external linksLinks
☆12Mar 1, 2023Updated 2 years ago
Alternatives and similar repositories for post-quantum-state-leakage-secure-ake
Users that are interested in post-quantum-state-leakage-secure-ake are comparing it to the libraries listed below
Sorting:
- I-D that describes the algorithm identifiers for NIST's PQC ML-DSA for use in the Internet X.509 Public Key Infrastructure☆14Oct 30, 2025Updated 3 months ago
- Bottom-up memory-safety for assembly language using symbolic execution☆17Updated this week
- (Oblivious) DoH Server☆26Feb 21, 2022Updated 3 years ago
- ☆23Apr 5, 2025Updated 10 months ago
- App for diabetics to easily remind them about measuring sugar level after selected time. Created on request of my diabetic friend.☆15Jan 15, 2024Updated 2 years ago
- Exploration of NIST post-quantum signatures on-ramp candidates☆38Jun 1, 2025Updated 8 months ago
- Project repository for "Evaluating the persuasive influence of political microtargeting with large language models" by Kobi Hackenburg an…☆11Jun 19, 2024Updated last year
- A self-hosted, privacy-focused publishing platform for autonomous and independent newsrooms.☆34Jan 12, 2025Updated last year
- Mobile camera-based application that attempts to alter photos to preserve their utility to humans while making them unusable for facial r…☆34Apr 21, 2023Updated 2 years ago
- Proof of concept for an anti-phishing browser plugin, working by comparing pages screenshots with perceptual hashing algorithms.☆10Apr 3, 2022Updated 3 years ago
- Materijali za vežbe iz predmeta Internet softverske arhitekture, Katedra za informatiku na Fakultetu tehničkih nauka u Novom Sadu☆11Nov 12, 2023Updated 2 years ago
- OpenSelfie is an Open Source (hardware and software) photobooth based on the Raspberry Pi and Wyolum's AlaMode☆15Oct 15, 2015Updated 10 years ago
- Protect Your Secrets. Forever. Ultra-secure notes powered by blockchain.☆13Apr 29, 2025Updated 9 months ago
- A collection of post-quantum cryptographic algorithms (and emerging standards) implemented in Rust.☆16Jul 18, 2025Updated 6 months ago
- Get advice for the best post-quantum cryptography algorithm for your use case☆16Sep 11, 2025Updated 5 months ago
- Sage Math recompiled to run on the Raspberry Pi☆15Oct 9, 2015Updated 10 years ago
- Cloud Security Automation☆14Dec 2, 2020Updated 5 years ago
- Ask AI to test your website with a specific goal☆15Dec 22, 2023Updated 2 years ago
- ☆12Nov 25, 2018Updated 7 years ago
- repo for CIS 371 Spring 2018☆15Apr 14, 2018Updated 7 years ago
- Mender over-the-air software updater client for microcontrollers (MCUs).☆17Updated this week
- ☆12Jan 17, 2026Updated 3 weeks ago
- Library Secruity dependency Checker☆12Sep 13, 2019Updated 6 years ago
- Secure decentralized hierarchical coordination platform☆22Nov 19, 2022Updated 3 years ago
- XMSS[MT] commandline tool☆13Dec 18, 2023Updated 2 years ago
- [AAAI 2024] DataElixir: Purifying Poisoned Dataset to Mitigate Backdoor Attacks via Diffusion Models☆12Dec 5, 2024Updated last year
- Ver 1.1 by Mike Tucker / published by CreativeApplications.Net☆17Jul 12, 2011Updated 14 years ago
- ☆27Dec 18, 2025Updated last month
- Web client (static HTML and Javascript) built with Google Web Toolkit☆44Jul 21, 2011Updated 14 years ago
- Official Black Hat Arsenal Security Tools Repository☆10Aug 12, 2017Updated 8 years ago
- Optimized implementation of ring-TESLA☆11Aug 4, 2016Updated 9 years ago
- Dark Patterns in Chatbot Design☆17Jun 15, 2024Updated last year
- An application that generates art by inserting text at random points in the image file.☆12Apr 4, 2012Updated 13 years ago
- Shoot and View utility for Transcend WiFi SD card for Windows, Mac and linux.☆11May 16, 2022Updated 3 years ago
- Landlock configuration library☆21Nov 28, 2025Updated 2 months ago
- Replication materials for "Identifying the Development and Application of Artificial Intelligence in Scientific Text"☆13Feb 18, 2020Updated 5 years ago
- Proof of Concept of the steganographic algorithms implemented by APT 29 (Hammertos)☆10Nov 26, 2018Updated 7 years ago
- ☆12Sep 28, 2025Updated 4 months ago
- sample implementation of deeploco☆15Nov 5, 2018Updated 7 years ago