stef / klutshnikLinks
data-at-rest updatable threshold encryption KMS server and client
β21Updated 3 weeks ago
Alternatives and similar repositories for klutshnik
Users that are interested in klutshnik are comparing it to the libraries listed below
Sorting:
- π₯Έ Experimental p2p gossip network for OpenPGP signature transparency π₯Έβ34Updated last month
- library providing OPRF and Threshold OPRF based on libsodiumβ28Updated last month
- A tiny, portable implementation of the IPCrypt specification in C.β31Updated last month
- β11Updated 2 years ago
- A cache hard password hash/KDFβ48Updated last year
- A permissively licensed, low-level, high-performance cryptographic hash library for hackers.β27Updated 5 months ago
- c implementation of the OPAQUE protocol with bindings for python, php, ruby, lua, zig, java, erlang, golang, js and SASL. also supports aβ¦β84Updated 4 months ago
- A tweakable block cipherβ31Updated last year
- Minimal setup to trigger the xz backdoorβ28Updated last year
- post-quantum safe encryption plugin for age encryptionβ23Updated 3 years ago
- Open Cryptanalysis Platformβ10Updated this week
- AES-GEM (AES Galois Extended Mode) implementation.β13Updated 8 months ago
- A fast, easy-to-use, and secure command-line tool for encrypting and decrypting files or entire directory trees.β51Updated last week
- I-D that describes the algorithm identifiers for NIST's PQC ML-DSA for use in the Internet X.509 Public Key Infrastructureβ14Updated 3 weeks ago
- The AEGIS-128X and AEGIS-256X high performance ciphers.β38Updated 11 months ago
- A super simple /sbin/init for Linux which allows running one and only one programβ29Updated last year
- A tool to help you understand TPM commands and responses.β47Updated 11 months ago
- Attack code for UHEPRNG (Ultra High Entropy Pseudo-Random Number Generator)β11Updated 7 years ago
- An Internet-Draft for the Balloon Key Derivation Function (BKDF), a memory-hard password hashing and password-based key derivation functiβ¦β11Updated 4 months ago
- Reference implementations of post-quantum cryptographic primitivesβ32Updated 2 months ago
- Documentation about the xz backdoor created by #xz-backdoor-reversingβ61Updated last year
- β27Updated this week
- An SSH metadata analyser used to showcase a timing-based attack on the protocol.β28Updated last year
- Demonstrate ability to read memfd_secret() data from the kernelβ58Updated last year
- Tools for power measurements of post-quantum cryptographic algorithmsβ29Updated 5 years ago
- A suite of testvectors for X.509 certificate path validation and tools for building themβ54Updated this week
- BAT KEM/Signature Reference Implementationβ23Updated 3 years ago
- β24Updated last year
- CLI tools: encoders/decoders, CTF and reverse engineering helpers.β139Updated 2 weeks ago
- A tool for linear and differential cryptanalysis of block ciphers written in Rustβ14Updated 3 years ago