veorq / cryptocodingLinks
Guidelines for low-level cryptography software
☆1,183Updated 2 years ago
Alternatives and similar repositories for cryptocoding
Users that are interested in cryptocoding are comparing it to the libraries listed below
Sorting:
- A collection of common (interesting) cryptographic mistakes and learning resources.☆364Updated 5 months ago
- Intuitive Advanced Cryptography☆436Updated 3 years ago
- Lecture notes for a course on cryptography☆563Updated 2 years ago
- Constant-Time Toolkit☆300Updated 7 years ago
- A party game for nerdy cryptographers. Shamelessly based on Cards Against Humanity.☆323Updated 5 years ago
- An easy to use, easy to deploy crypto library☆685Updated last year
- Understand and mitigate software-observable side-channels☆505Updated 4 years ago
- A lightweight, secure, easy-to-use crypto library suitable for constrained environments.☆737Updated this week
- unfork(2) is the inverse of fork(2). sort of.☆1,482Updated last year
- eXtended Keccak Code Package☆631Updated last week
- SIDH Library is a fast and portable software library that implements state-of-the-art supersingular isogeny cryptographic schemes. The ch…☆325Updated 2 years ago
- A fast, parallel test case minimization tool.☆975Updated 5 years ago
- Cryptographic Primitive Code Generation by Fiat☆789Updated last week
- The Illustrated TLS 1.3 Connection: Every byte explained☆890Updated 5 months ago
- Crypto Audit Guidelines☆134Updated 5 years ago
- A place for useful crypto-related resources plus some of my fav stuff☆220Updated 4 years ago
- A curated list of resources about post-quantum cryptography.☆353Updated 4 months ago
- Cingulata (pronounced "tchingulata") is a compiler toolchain and RTE for running C++ programs over encrypted data by means of fully homom…☆407Updated 6 months ago
- Community Cryptography Specification Project☆481Updated last week
- dude, is my code constant time?☆194Updated last year
- Adiantum and HPolyC specification and test vectors☆477Updated last year
- Library for the Shamir secret sharing scheme☆388Updated 4 months ago
- Library consisting of explanation and implementation of all the existing attacks on various Encryption Systems, Digital Signatures, Key E…☆1,591Updated 4 years ago
- Proof of Concepts (PE, PDF...)☆1,534Updated last year
- Meaningful control of data in distributed systems.☆1,441Updated last week
- Library for elliptic curves cryptography☆263Updated 2 years ago
- ☆451Updated 2 years ago
- MLS protocol☆241Updated last year
- A Course in Cryptanalysis☆148Updated last year
- A general purpose memory allocator that implements an isolation security strategy to mitigate memory safety issues while maintaining good…☆383Updated 2 weeks ago