veorq / cryptocodingLinks
Guidelines for low-level cryptography software
☆1,164Updated 2 years ago
Alternatives and similar repositories for cryptocoding
Users that are interested in cryptocoding are comparing it to the libraries listed below
Sorting:
- A collection of common (interesting) cryptographic mistakes and learning resources.☆352Updated last month
- Intuitive Advanced Cryptography☆436Updated 3 years ago
- Lecture notes for a course on cryptography☆538Updated last year
- A lightweight, secure, easy-to-use crypto library suitable for constrained environments.☆705Updated 4 months ago
- Understand and mitigate software-observable side-channels☆501Updated 4 years ago
- A party game for nerdy cryptographers. Shamelessly based on Cards Against Humanity.☆322Updated 5 years ago
- Constant-Time Toolkit☆297Updated 6 years ago
- Cryptographic library☆810Updated 2 months ago
- An easy to use, easy to deploy crypto library☆653Updated 9 months ago
- A place for useful crypto-related resources plus some of my fav stuff☆219Updated 4 years ago
- Cryptographic Primitive Code Generation by Fiat☆770Updated this week
- Crypto Audit Guidelines☆134Updated 4 years ago
- A curated list of resources about post-quantum cryptography.☆326Updated last week
- The Illustrated TLS 1.3 Connection: Every byte explained☆875Updated 3 weeks ago
- The papers and books I've read or am about to read.☆1,148Updated 5 years ago
- Ledger's Advanced Side-Channel Analysis Repository☆397Updated last year
- eXtended Keccak Code Package☆621Updated this week
- Modern Memory Safety in C/C++☆1,216Updated 9 years ago
- Library consisting of explanation and implementation of all the existing attacks on various Encryption Systems, Digital Signatures, Key E…☆1,573Updated 4 years ago
- Cingulata (pronounced "tchingulata") is a compiler toolchain and RTE for running C++ programs over encrypted data by means of fully homom…☆407Updated 2 months ago
- SIDH Library is a fast and portable software library that implements state-of-the-art supersingular isogeny cryptographic schemes. The ch…☆325Updated 2 years ago
- unfork(2) is the inverse of fork(2). sort of.☆1,478Updated last year
- Signed/Encrypted ARchive: always-encrypted tar-like archive tool with optional signature support☆356Updated 2 years ago
- Adiantum and HPolyC specification and test vectors☆476Updated last year
- A fast, parallel test case minimization tool.☆969Updated 4 years ago
- A general purpose memory allocator that implements an isolation security strategy to mitigate memory safety issues while maintaining good…☆380Updated last year
- Linux Kernel Defence Map shows the relationships between vulnerability classes, exploitation techniques, bug detection mechanisms, and de…☆2,209Updated 8 months ago
- The x86 processor fuzzer☆511Updated 6 years ago
- High-speed secure pseudorandom function for short messages☆715Updated last year
- A Course in Cryptanalysis☆145Updated 10 months ago