search
Join or Log In

Cryptography

Browse 11 cybersecurity tools tagged with "Cryptography"

CRT sh

CRT sh

language

Certificate Lifecycle Management

CRT sh on SecurityListing: Crt.sh is a website that allows users to search for SSL/TLS certificates of a targeted domain, providing transparency into certificate logs.

4.7(2)
Crypto Drainer Attack

Crypto Drainer Attack

language

Write-ups

Crypto Drainer Attack on SecurityListing: A deep dive into the Ledger connect-kit compromise decryption process.

4.5(3)
The Matasano Crypto Challenges

The Matasano Crypto

language

Secure Code Training

The Matasano Crypto Challenges on SecurityListing: A set of 48 practical programming exercises in cryptography and application security

4.5(1)
OpenFHE

OpenFHE

language

Data Masking

OpenFHE on SecurityListing: OpenFHE is an open-source library implementing post-quantum Fully Homomorphic Encryption schemes with simplified APIs and cross-platform support.

4.5(1)
eShard esDynamic

eShard esDynamic

language

Penetration Testing

eShard esDynamic on SecurityListing: Platform for chip security testing and binary security analysis

4.5(1)
Entropy Source Evaluation

Entropy Source Evaluation

language

Static Application Security Testing

Entropy Source Evaluation on SecurityListing: Using high-quality entropy sources for CSPRNG seeding is crucial for security.

4.3(2)
Accutive Security

Accutive Security

language

Key Management

Accutive Security on SecurityListing: Cryptography and IAM consulting services with PKI and certificate mgmt.

3.8(1)
Wireguard

Wireguard

language

VPN

Wireguard on SecurityListing: Fast, simple, and secure VPN that uses cutting-edge cryptography

SCANOSS Encryption Dataset

SCANOSS Encryption Dataset

language

Risk Assessment

SCANOSS Encryption Dataset on SecurityListing: Identifies cryptographic algorithms and libraries in code for compliance

Security Driven .NET

Security Driven .NET

language

Guides

Security Driven .NET on SecurityListing: A practical security handbook for .NET developers covering essential security controls, cryptographic functions, and secure coding practices.

urandom vs. CSPRNG for Crypto Keys

urandom vs. CSPRNG

language

Secure Code Training

urandom vs. CSPRNG for Crypto Keys on SecurityListing: Utilize the kernel's CSPRNG for generating crypto keys instead of userspace CSPRNGs to avoid randomness failures.