Stars
Crescent adds privacy to existing credentials with zero-knowledge
Rust implementation of the Messaging Layer Security (MLS) protocol
A collection of high-performance crypto implementations.
Instant voice cloning by MIT and MyShell. Audio foundation model.
RSA attack tool (mainly for ctf) - retrieve private key from weak public key and/or uncipher data
My Cryptopals solutions, very roughly written (in Vietnamese!)
A basic micro-benchmark of the signature algorithms provided by Google's Tink library.
Sample implementations of the attacks shown in https://eprint.iacr.org/2020/1456
Fully homomorphic encryption based mail spam detection
Use Touch ID / Secure Enclave for SSH Authentication!
attacking RSA via lattice reductions (LLL)
Concrete: TFHE Compiler that converts python programs into FHE equivalent
This is a combination of several different projects. It is intended to understand what the Meltdown and Spectre exploits are capable of.
the Network Protocol Fuzzer that we will want to use.
PoC CVE-2021-37980 : Inappropriate implementation in Sandbox (windows only)
CIRCL: Cloudflare Interoperable Reusable Cryptographic Library
Experimental implementation of KEMTLS in Rustls
The SPHINCS+ reference code, accompanying the submission to NIST's Post-Quantum Cryptography project