pwn2winctf / NIZKCTF
Upstream for Non Interactive Zero Knowledge CTF platform
☆10Updated 4 years ago
Related projects: ⓘ
- The noise swiss army knife☆43Updated 3 years ago
- free crypto audit☆31Updated 7 years ago
- ☆16Updated this week
- This is a toy implementation in Go of Manger's chosen-ciphertext attack on RSA-OAEP☆31Updated 6 years ago
- ☆25Updated last year
- ☆11Updated 3 years ago
- Docker Secure Computing Profile Generator☆47Updated 2 years ago
- Differential fuzzing for elliptic curves☆22Updated last year
- F-Secure Armory Drive - USB encrypted drive with mobile unlock over BLE☆54Updated 11 months ago
- GPU code for the first SHA-1 collision attack and two freestart attacks☆14Updated 4 years ago
- ☆13Updated 4 years ago
- A design for doing more private Signal groups using anonymous credentials based on algebraic MACs.☆14Updated 4 years ago
- Kudelski Security's 2018 pre-Black Hat crypto challenge☆36Updated 6 years ago
- Going Florida on container keyring masks. A tool to demonstrate the ineffectivity containers have on isolating Linux Kernel keyrings.☆43Updated last year
- the puppy proxy☆21Updated 4 years ago
- A browsable archive of all Underhanded Crypto Contest entries.☆34Updated 5 years ago
- Detect patterns of bad behavior in function calls☆25Updated 4 years ago
- ☆18Updated this week
- A man in the middle detection tool for LANs☆23Updated last year
- A proof-of-concept Linux clone of Santa, Google's binary authorization system for macOS☆26Updated last year
- Go API to interact with radare2☆31Updated 10 months ago
- ☆22Updated 2 years ago
- A warrant canary system☆30Updated 6 years ago
- Mirror of all PDFs from the IACR's eprint☆46Updated 8 months ago
- Minimal Indicator Storage System☆11Updated 3 years ago
- Intuitive Quantum Computation and Post-Quantum Cryptography☆62Updated 2 years ago
- REbus facilitates the coupling of existing tools that perform specific tasks, where one's output will be used as the input of others.☆25Updated 3 years ago
- ☆10Updated this week
- Sample implementations of the attacks shown in https://eprint.iacr.org/2020/1456☆20Updated 2 years ago
- Tools for power measurements of post-quantum cryptographic algorithms☆26Updated 4 years ago