vmonaco / kreepLinks
Keystroke Recognition and Entropy Elimination Program
☆14Updated 5 years ago
Alternatives and similar repositories for kreep
Users that are interested in kreep are comparing it to the libraries listed below
Sorting:
- Practical Keystroke Timing Attacks in Sandboxed JavaScript☆31Updated 8 years ago
- This is a toy implementation in Go of Manger's chosen-ciphertext attack on RSA-OAEP☆31Updated 7 years ago
- Public forum for detailed planning of a VLDB-like ongoing submission model for IEEE S&P☆15Updated 8 years ago
- cribdrag - an interactive crib dragging tool for cryptanalysis on ciphertext generated with reused or predictable stream cipher keys☆175Updated 4 years ago
- Kudelski Security's 2018 pre-Black Hat crypto challenge☆36Updated 6 years ago
- ☆170Updated 4 years ago
- Detect common mistakes in academic papers☆61Updated 6 years ago
- TLS Library in python☆235Updated 3 years ago
- A server-side Website Fingerprinting defence called "Application Layer Padding Concerns Adversaries"☆11Updated 6 years ago
- Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS☆118Updated 8 years ago
- Timing Attack on TLS' ECDSA signature☆42Updated 9 years ago
- SGX command-line tools and paper☆146Updated 8 years ago
- SSL/TLS layers for scapy the interactive packet manipulation tool☆424Updated 3 years ago
- ☆192Updated last year
- ☆139Updated 2 months ago
- Solutions to Matasano crypto challenges in Python 3.☆107Updated 2 years ago
- Frankencert - Adversarial Testing of Certificate Validation in SSL/TLS Implementations☆178Updated 2 years ago
- SCALE: Side-Channel Attack Lab. Exercises☆43Updated last year
- TLS Fingerprints☆52Updated 8 years ago
- Solutions for the Matasano Crypto Challenges☆23Updated 6 years ago
- Implementation of Bleichenbacher, Manger and Ben-Or attacks on RSA PKCS#1 v1.5☆42Updated 6 years ago
- Secretgrind: a Valgrind analysis tool to detect secrets in memory☆61Updated 8 years ago
- free crypto audit☆31Updated 8 years ago
- ☆89Updated 11 months ago
- Blogs about Cryptography/Security to follow☆46Updated 3 years ago
- ☆149Updated 6 years ago
- ☆232Updated 6 months ago
- A system for securely splitting secrets with Shamir's Secret Sharing Scheme☆508Updated 3 years ago
- Repo of code for FPStalker article☆32Updated 7 years ago
- The Scyther Tool for the symbolic analysis of security protocols☆103Updated 7 months ago