pwn2winctf / NIZKCTF
Upstream for Non Interactive Zero Knowledge CTF platform
☆10Updated 4 years ago
Alternatives and similar repositories for NIZKCTF:
Users that are interested in NIZKCTF are comparing it to the libraries listed below
- ☆22Updated this week
- (Oblivious) DoH Server☆26Updated 3 years ago
- Intuitive Quantum Computation and Post-Quantum Cryptography☆62Updated 2 years ago
- Armory Drive - USB encrypted drive with mobile unlock over BLE☆54Updated this week
- ☆13Updated 4 years ago
- Auditing Applied Cryptography☆10Updated 5 years ago
- The noise swiss army knife☆44Updated 4 years ago
- Supporting materials for our EuroS&P paper: Automated Verification for Secure Messaging Protocols and their Implementations: A Symbolic a…☆36Updated 2 years ago
- Differential fuzzing for elliptic curves☆23Updated last year
- Abusing Cloudflare Workers to establish persistence and exfiltrate sensitive data at the edge.☆16Updated 2 years ago
- experimental threat modeling tools☆14Updated 2 years ago
- Sample implementations of the attacks shown in https://eprint.iacr.org/2020/1456☆20Updated 3 years ago
- ☆20Updated 7 months ago
- GPU code for the first SHA-1 collision attack and two freestart attacks☆14Updated 4 years ago
- A design for doing more private Signal groups using anonymous credentials based on algebraic MACs.☆14Updated 5 years ago
- Mirror of all PDFs from the IACR's eprint☆46Updated last year
- free crypto audit☆31Updated 8 years ago
- Fuzzing Go crypto☆74Updated 6 years ago
- Docker Secure Computing Profile Generator☆48Updated 3 years ago
- Geolocate your files!☆16Updated 3 years ago
- Mapping the NYC Infosec Community☆52Updated this week
- List of crackpot 'scientists' and 'thinkers'☆16Updated 8 months ago
- Crypto Audit Guidelines☆134Updated 4 years ago
- Implementation of Bleichenbacher, Manger and Ben-Or attacks on RSA PKCS#1 v1.5☆42Updated 6 years ago
- A warrant canary system☆30Updated 6 years ago
- ☆22Updated 7 years ago
- Implementation of the key recovery attack against GEA-1 keys (Eurocrypt 2021)☆48Updated 3 years ago
- egrets monitors egress☆45Updated 5 years ago
- Going Florida on container keyring masks. A tool to demonstrate the ineffectivity containers have on isolating Linux Kernel keyrings.☆43Updated last year
- Monorepo for infrastructure and challenges of SECedu CTF 2019.☆27Updated 4 years ago