twosixlabs / coffeebreak
☆25Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for coffeebreak
- Differential fuzzing for elliptic curves☆23Updated last year
- A history of PGP-related vulnerabilities☆21Updated 3 years ago
- ☆20Updated 4 months ago
- A tool to help you understand TPM commands and responses.☆34Updated last month
- Tools for power measurements of post-quantum cryptographic algorithms☆26Updated 4 years ago
- Detect patterns of bad behavior in function calls☆25Updated 4 years ago
- ☆11Updated 4 years ago
- Mirror of a website on Elligator by Daniel J. Bernstein, Mike Hamburg, Anna Krasnova, and Tanja Lange☆16Updated 2 months ago
- An RFC5297-compliant C implementation of AES-SIV☆19Updated 4 years ago
- ☆33Updated 2 weeks ago
- TCP ISN CPU Information Leak Protection. TCP Initial Sequence Numbers Randomization to prevent TCP ISN based CPU Information Leaks.☆43Updated 3 weeks ago
- SoniControl - the first ultrasonic firewall☆90Updated last year
- Verifying constant-time code with symbolic execution☆42Updated 3 years ago
- A tweakable block cipher☆30Updated 5 months ago
- Privacy Enhancements for Android☆14Updated 4 years ago
- How fast can we brute force a 64-bit comparison?☆52Updated 4 years ago
- Supporting materials for our EuroS&P paper: Automated Verification for Secure Messaging Protocols and their Implementations: A Symbolic a…☆36Updated 2 years ago
- Bertie TLS 1.3 Implementation☆112Updated this week
- sandbox demo☆9Updated 9 months ago
- Open Sim Kit (OSK) is FOSS software for editing the content and functions of SIM cards.☆29Updated 11 years ago
- A design for doing more private Signal groups using anonymous credentials based on algebraic MACs.☆14Updated 4 years ago
- A collection of high-performance crypto implementations.☆44Updated 3 months ago
- ☆81Updated 4 years ago
- Geolocate your files!☆16Updated 2 years ago
- Crypto library☆52Updated last month
- A cache hard password hash/KDF☆44Updated 7 months ago
- A browsable archive of all Underhanded Crypto Contest entries.☆34Updated 5 years ago
- Checks for tpm vulnerabilities☆36Updated last year
- generate pgp keys with vanity fingerprints☆17Updated 7 years ago