sweis / deprecated-crypto-might-not-suckLinks
List of crypto projects that might not suck
☆423Updated 2 years ago
Alternatives and similar repositories for deprecated-crypto-might-not-suck
Users that are interested in deprecated-crypto-might-not-suck are comparing it to the libraries listed below
Sorting:
- Pond☆915Updated 3 years ago
- Noise Specification☆459Updated 7 years ago
- ☆58Updated 8 years ago
- Double Ratchet Algorithm☆378Updated 9 years ago
- How to backdoor Diffie-Hellman☆613Updated 9 years ago
- opmsg message encryption☆754Updated 2 years ago
- Links to stuff arising from or related to the HACS workshop.☆34Updated 7 years ago
- Memory-hard scheme Argon2☆207Updated 4 years ago
- Provably Anonymous Overlay☆323Updated 10 years ago
- Meta-repository for Miscreant: misuse-resistant symmetric encryption library with AES-SIV (RFC 5297) and AES-PMAC-SIV support☆474Updated 6 years ago
- WARNING: Deprecated! See Privacy Pass☆99Updated 8 years ago
- ☆89Updated 9 years ago
- Configuration to use gpg smartcards for ssh authentication☆159Updated 7 years ago
- ☆56Updated 9 years ago
- Use OpenPGP-based encryption in Yahoo mail.☆221Updated 9 years ago
- A CONIKS implementation in Java☆60Updated 7 years ago
- A public database for software and firmware hashes☆214Updated 8 years ago
- A transparent and secure way to look up public keys.☆1,573Updated 4 years ago
- Constant-Time Toolkit☆299Updated 7 years ago
- OZ: a sandboxing system targeting everyday workstation applications☆440Updated 7 years ago
- Overview of projects working on next-generation secure email.☆476Updated 7 years ago
- As a proof-of-concept, we will show how easy it is to revoke a self-signed certificate using the bitcoin blockchain. This will also demon…☆122Updated 10 years ago
- ☆33Updated 8 years ago
- A library for off-the-record (deniable authenticated forward secure confidential) multiparty messaging☆405Updated 8 years ago
- Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS☆119Updated 8 years ago
- Reviews of U2F devices☆433Updated 7 years ago
- Small scripts and utilities, often for using other programs with Tor, routing traffic safely, removing fingerprintable system traits, and…☆177Updated 7 years ago
- A reversible DER and BER pretty-printer.☆248Updated this week
- A reading list for infosec engineers☆538Updated 7 years ago
- A Password hash storage scheme that prevents an attacker from cracking passwords individually and efficiently.☆320Updated 8 years ago