sweis / deprecated-crypto-might-not-suck
List of crypto projects that might not suck
☆423Updated last year
Related projects: ⓘ
- Noise Specification☆450Updated 5 years ago
- Pond☆912Updated 2 years ago
- opmsg message encryption☆750Updated last year
- Meta-repository for Miscreant: misuse-resistant symmetric encryption library with AES-SIV (RFC 5297) and AES-PMAC-SIV support☆474Updated 5 years ago
- How to backdoor Diffie-Hellman☆610Updated 8 years ago
- ☆616Updated this week
- Double Ratchet Algorithm☆377Updated 8 years ago
- Constant-Time Toolkit☆294Updated 6 years ago
- ☆87Updated 8 years ago
- A Password hash storage scheme that prevents an attacker from cracking passwords individually and efficiently.☆321Updated 7 years ago
- ☆57Updated 7 years ago
- Crypto 101, the introductory book on cryptography.☆2,986Updated last year
- ☆781Updated 6 years ago
- Memory-hard scheme Argon2☆201Updated 3 years ago
- Encrypted peer-to-peer web application platform for decentralized, privacy-preserving applications☆1,149Updated 8 years ago
- A public database for software and firmware hashes☆216Updated 7 years ago
- TLS 1.3 Specification☆562Updated this week
- ☆283Updated 8 years ago
- A transparent and secure way to look up public keys.☆1,573Updated 3 years ago
- Provably Anonymous Overlay☆321Updated 9 years ago
- A party game for nerdy cryptographers. Shamelessly based on Cards Against Humanity.☆321Updated 4 years ago
- A reading list for infosec engineers☆536Updated 6 years ago
- Guidelines for low-level cryptography software☆1,101Updated last year
- duraconf - A collection of hardened configuration files for SSL/TLS services☆977Updated 2 years ago
- Modern Memory Safety in C/C++☆1,208Updated 8 years ago
- A reversible DER and BER pretty-printer.☆231Updated 10 months ago
- ROCA: Infineon RSA key vulnerability☆478Updated 11 months ago
- The DrK Attack - Proof of concept☆342Updated 2 years ago
- Educational SSH client☆123Updated 8 years ago
- Best Current Practices regarding secure online communication and configuration of services using cryptography.☆703Updated 2 years ago