stef / klutshnikLinks
data-at-rest updatable threshold encryption KMS server and client
☆22Updated last week
Alternatives and similar repositories for klutshnik
Users that are interested in klutshnik are comparing it to the libraries listed below
Sorting:
- A cache hard password hash/KDF☆49Updated last year
- A tiny, portable implementation of the IPCrypt specification in C.☆32Updated 2 weeks ago
- A permissively licensed, low-level, high-performance cryptographic hash library for hackers.☆27Updated 7 months ago
- A tweakable block cipher☆31Updated last year
- Minimal setup to trigger the xz backdoor☆29Updated last year
- A tool to help you understand TPM commands and responses.☆47Updated last year
- post-quantum safe encryption plugin for age encryption☆24Updated 3 years ago
- A super simple /sbin/init for Linux which allows running one and only one program☆29Updated 2 years ago
- I-D that describes the algorithm identifiers for NIST's PQC ML-DSA for use in the Internet X.509 Public Key Infrastructure☆14Updated 3 months ago
- Privacy Pass implementation in Rust☆57Updated last month
- c implementation of the OPAQUE protocol with bindings for python, php, ruby, lua, zig, java, erlang, golang, js and SASL. also supports a…☆86Updated 7 months ago
- 🥸 Experimental p2p gossip network for OpenPGP signature transparency 🥸☆35Updated 3 weeks ago
- AES-GEM (AES Galois Extended Mode) implementation.☆13Updated 3 weeks ago
- Katzenpost is a free and open source software project dedicated to researching and developing mix network protocols☆139Updated this week
- An SSH metadata analyser used to showcase a timing-based attack on the protocol.☆29Updated last year
- List of crackpot 'scientists' and 'thinkers'☆20Updated 7 months ago
- A tool for linear and differential cryptanalysis of block ciphers written in Rust☆15Updated 3 years ago
- Sample implementations of the attacks shown in https://eprint.iacr.org/2020/1456☆21Updated 4 years ago
- ☆23Updated last year
- library providing OPRF and Threshold OPRF based on libsodium☆29Updated last week
- Attack code for UHEPRNG (Ultra High Entropy Pseudo-Random Number Generator)☆11Updated 7 years ago
- A more realistic demo of a buffer overflow cause by -ffast-math☆15Updated 3 years ago
- An Internet-Draft for the Balloon Key Derivation Function (BKDF), a memory-hard password hashing and password-based key derivation functi…☆11Updated 7 months ago
- Open Cryptanalysis Platform☆11Updated this week
- A suite of testvectors for X.509 certificate path validation and tools for building them☆56Updated last week
- BAT KEM/Signature Reference Implementation☆23Updated 4 years ago
- Bertie TLS 1.3 Implementation☆130Updated 3 months ago
- The AEGIS-128X and AEGIS-256X high performance ciphers.☆38Updated last year
- A Brainfuck interpreter embedded inside DWARF debug information☆40Updated last year
- Demonstrate ability to read memfd_secret() data from the kernel☆58Updated 2 years ago