veorq / cryptocoding
Guidelines for low-level cryptography software
☆1,110Updated last year
Related projects ⓘ
Alternatives and complementary repositories for cryptocoding
- A collection of common (interesting) cryptographic mistakes and learning resources.☆319Updated 3 months ago
- Intuitive Advanced Cryptography☆430Updated 2 years ago
- Cryptographic library☆715Updated 2 months ago
- Fuzzing cryptographic libraries. Magic bug printer go brrrr.☆687Updated 2 weeks ago
- Lecture notes for a course on cryptography☆513Updated 11 months ago
- Constant-Time Toolkit☆294Updated 6 years ago
- Understand and mitigate software-observable side-channels☆498Updated 3 years ago
- Crypto Audit Guidelines☆132Updated 3 years ago
- A lightweight, secure, easy-to-use crypto library suitable for constrained environments.☆631Updated 2 weeks ago
- A general purpose memory allocator that implements an isolation security strategy to mitigate memory safety issues while maintaining good…☆364Updated 4 months ago
- A place for useful crypto-related resources plus some of my fav stuff☆220Updated 3 years ago
- Modern Memory Safety in C/C++☆1,211Updated 8 years ago
- A curated list of cryptography papers, articles, tutorials and howtos.☆1,804Updated last month
- A fast, parallel test case minimization tool.☆947Updated 3 years ago
- An easy to use, easy to deploy crypto library☆613Updated 3 weeks ago
- A party game for nerdy cryptographers. Shamelessly based on Cards Against Humanity.☆320Updated 4 years ago
- High-speed secure pseudorandom function for short messages☆660Updated 6 months ago
- Meta-repository for Miscreant: misuse-resistant symmetric encryption library with AES-SIV (RFC 5297) and AES-PMAC-SIV support☆474Updated 5 years ago
- Signed/Encrypted ARchive: always-encrypted tar-like archive tool with optional signature support☆355Updated last year
- ELF visualizer. Generates HTML files from ELF binaries.☆928Updated last year
- Avast JavaScript Interactive Shell☆666Updated 4 years ago
- Linux Kernel Defence Map shows the relationships between vulnerability classes, exploitation techniques, bug detection mechanisms, and de…☆1,777Updated 4 months ago
- documentations, slides decks...☆777Updated 6 months ago
- Some helpful preload libraries for pwning stuff.☆1,574Updated 6 months ago
- eXtended Keccak Code Package☆588Updated 4 months ago
- A curated list of resources about post-quantum cryptography☆253Updated last month
- Obuscated C Christmas programs☆377Updated 2 years ago
- Noise Specification☆449Updated 6 years ago
- Encrypted personal archives☆634Updated last year
- Proof of Concepts (PE, PDF...)☆1,477Updated last year