sweis / deprecated-crypto-might-not-suck
List of crypto projects that might not suck
☆424Updated 2 years ago
Alternatives and similar repositories for deprecated-crypto-might-not-suck:
Users that are interested in deprecated-crypto-might-not-suck are comparing it to the libraries listed below
- Noise Specification☆450Updated 6 years ago
- Pond☆911Updated 3 years ago
- How to backdoor Diffie-Hellman☆611Updated 8 years ago
- Meta-repository for Miscreant: misuse-resistant symmetric encryption library with AES-SIV (RFC 5297) and AES-PMAC-SIV support☆474Updated 5 years ago
- Double Ratchet Algorithm☆377Updated 8 years ago
- opmsg message encryption☆753Updated last year
- Constant-Time Toolkit☆295Updated 6 years ago
- Configuration to use gpg smartcards for ssh authentication☆158Updated 7 years ago
- ☆57Updated 7 years ago
- GPG Sync is designed to let users always have up-to-date public keys for other members of their organization☆347Updated 2 years ago
- duraconf - A collection of hardened configuration files for SSL/TLS services☆975Updated 2 years ago
- Best Current Practices regarding secure online communication and configuration of services using cryptography.☆704Updated 3 years ago
- A public database for software and firmware hashes☆215Updated 8 years ago
- ☆88Updated 8 years ago
- A Password hash storage scheme that prevents an attacker from cracking passwords individually and efficiently.☆323Updated 7 years ago
- Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS☆117Updated 7 years ago
- Checking that functions are constant time with Valgrind☆177Updated 7 years ago
- ☆55Updated 9 years ago
- A library for off-the-record (deniable authenticated forward secure confidential) multiparty messaging☆406Updated 7 years ago
- Links to stuff arising from or related to the HACS workshop.☆35Updated 7 years ago
- A reading list for infosec engineers☆536Updated 6 years ago
- Axolotl Protocol Implementation☆421Updated 6 months ago
- Educational SSH client☆123Updated 8 years ago
- PGP-like encryption + torrent-like addressing + blockchain-like enforcement of data expiry☆123Updated 7 years ago
- Memory-hard scheme Argon2☆202Updated 4 years ago
- Reviews of U2F devices☆433Updated 6 years ago
- Your best is an idiot☆138Updated 8 years ago
- A collection of guidelines, use cases and experiments with the Yubikey☆344Updated 5 years ago
- TLS Library in python☆236Updated 2 years ago
- Crypto Audit Guidelines☆133Updated 4 years ago