veorq / cryptocodingLinks
Guidelines for low-level cryptography software
☆1,157Updated 2 years ago
Alternatives and similar repositories for cryptocoding
Users that are interested in cryptocoding are comparing it to the libraries listed below
Sorting:
- A collection of common (interesting) cryptographic mistakes and learning resources.☆348Updated last week
- Intuitive Advanced Cryptography☆438Updated 2 years ago
- Lecture notes for a course on cryptography☆534Updated last year
- A lightweight, secure, easy-to-use crypto library suitable for constrained environments.☆703Updated 3 months ago
- A party game for nerdy cryptographers. Shamelessly based on Cards Against Humanity.☆322Updated 5 years ago
- An easy to use, easy to deploy crypto library☆653Updated 8 months ago
- A place for useful crypto-related resources plus some of my fav stuff☆220Updated 3 years ago
- The Illustrated TLS 1.3 Connection: Every byte explained☆868Updated 8 months ago
- Constant-Time Toolkit☆296Updated 6 years ago
- SIDH Library is a fast and portable software library that implements state-of-the-art supersingular isogeny cryptographic schemes. The ch…☆324Updated 2 years ago
- Understand and mitigate software-observable side-channels☆500Updated 4 years ago
- Cryptographic library☆804Updated last month
- eXtended Keccak Code Package☆614Updated last month
- A curated list of resources about post-quantum cryptography.☆324Updated last month
- List of crypto projects that might not suck☆422Updated 2 years ago
- The papers and books I've read or am about to read.☆1,146Updated 5 years ago
- Library for elliptic curves cryptography☆261Updated 2 years ago
- unfork(2) is the inverse of fork(2). sort of.☆1,478Updated last year
- Library for the Shamir secret sharing scheme☆379Updated 3 years ago
- Adiantum and HPolyC specification and test vectors☆475Updated last year
- Crypto Audit Guidelines☆134Updated 4 years ago
- Cryptographic Primitive Code Generation by Fiat☆766Updated last week
- Library consisting of explanation and implementation of all the existing attacks on various Encryption Systems, Digital Signatures, Key E…☆1,563Updated 4 years ago
- Practical Cryptography for Developers: Hashes, MAC, Key Derivation, DHKE, Symmetric and Asymmetric Ciphers, Public Key Cryptosystems, RSA…☆3,671Updated last year
- dude, is my code constant time?☆181Updated last year
- Cingulata (pronounced "tchingulata") is a compiler toolchain and RTE for running C++ programs over encrypted data by means of fully homom…☆407Updated last month
- HACL*, a formally verified cryptographic library written in F*☆1,766Updated last week
- ☆443Updated last year
- Signed/Encrypted ARchive: always-encrypted tar-like archive tool with optional signature support☆356Updated 2 years ago
- Clean, portable, tested implementations of post-quantum cryptography☆735Updated 3 months ago