soatok / gcm-exploitLinks
☆16Updated last year
Alternatives and similar repositories for gcm-exploit
Users that are interested in gcm-exploit are comparing it to the libraries listed below
Sorting:
- Research and proof of concept to develop the next SecureDrop with end to end encryption.☆48Updated last week
- Minimal setup to trigger the xz backdoor☆28Updated 7 months ago
- A suite of testvectors for X.509 certificate path validation and tools for building them☆52Updated this week
- Random experiments and shenanigans☆13Updated 2 months ago
- Privacy Pass implementation in Rust☆36Updated 3 weeks ago
- Implementation of the Covercrypt attributes based encryption algorithm☆17Updated 2 months ago
- Suite of symmetric cryptography primitives built on top of the ASCON permutation☆44Updated 6 months ago
- A more realistic demo of a buffer overflow cause by -ffast-math☆13Updated 2 years ago
- A cache hard password hash/KDF☆47Updated last year
- The AEGIS-128X and AEGIS-256X high performance ciphers.☆35Updated 5 months ago
- Off-chain secure communication protocol with Zero-knowledge proof (Ring Signature) and metadata protection.☆24Updated 9 months ago
- Community Cryptography Test Vectors☆77Updated last month
- ☆12Updated 2 years ago
- An exploit chain for the Magic Leap One (and probably other TX2 devices)☆52Updated 3 weeks ago
- Mirror of a website on Elligator by Daniel J. Bernstein, Mike Hamburg, Anna Krasnova, and Tanja Lange☆16Updated 2 months ago
- Specification for a Fediverse Directory Server for Public Keys☆106Updated 2 months ago
- ☆25Updated this week
- I-D that describes the algorithm identifiers for NIST's PQC ML-DSA for use in the Internet X.509 Public Key Infrastructure☆12Updated last week
- Stuff discovered while analyzing the malware hidden in xz-utils 5.6.0 and 5.6.1☆58Updated 11 months ago
- playing with DDR DRAM bus fault injection☆92Updated 7 months ago
- PoC for PixieFail vulnerabilities☆23Updated last year
- A Certificate Transparency log implementation and monitoring API designed for scalability, ease of operation, and reduced cost.☆163Updated 2 weeks ago
- EVE Virtual Environment - A management toolkit for libvirt-based virtualization servers.☆11Updated 2 months ago
- Get rickrolled, right in your favourite NSA reverse engineering tool☆77Updated 2 years ago
- List of crackpot 'scientists' and 'thinkers'☆19Updated last week
- Assured confidential execution (ACE) implements VM-based trusted execution environment (TEE) for embedded RISC-V systems with focus on a …☆157Updated last week
- ☆35Updated last year
- XZ backdoor reverse engineering☆95Updated 10 months ago
- A tool to help you understand TPM commands and responses.☆44Updated 6 months ago
- ☆13Updated 2 years ago