Cryptography
Browse 11 cybersecurity tools tagged with "Cryptography"

CRT sh
Certificate Lifecycle Management
CRT sh on SecurityListing: Crt.sh is a website that allows users to search for SSL/TLS certificates of a targeted domain, providing transparency into certificate logs.

Crypto Drainer Attack
Write-ups
Crypto Drainer Attack on SecurityListing: A deep dive into the Ledger connect-kit compromise decryption process.

The Matasano Crypto
Secure Code Training
The Matasano Crypto Challenges on SecurityListing: A set of 48 practical programming exercises in cryptography and application security

OpenFHE
Data Masking
OpenFHE on SecurityListing: OpenFHE is an open-source library implementing post-quantum Fully Homomorphic Encryption schemes with simplified APIs and cross-platform support.

eShard esDynamic
Penetration Testing
eShard esDynamic on SecurityListing: Platform for chip security testing and binary security analysis

Entropy Source Evaluation
Static Application Security Testing
Entropy Source Evaluation on SecurityListing: Using high-quality entropy sources for CSPRNG seeding is crucial for security.

Accutive Security
Key Management
Accutive Security on SecurityListing: Cryptography and IAM consulting services with PKI and certificate mgmt.

Wireguard
VPN
Wireguard on SecurityListing: Fast, simple, and secure VPN that uses cutting-edge cryptography

SCANOSS Encryption Dataset
Risk Assessment
SCANOSS Encryption Dataset on SecurityListing: Identifies cryptographic algorithms and libraries in code for compliance

Security Driven .NET
Guides
Security Driven .NET on SecurityListing: A practical security handbook for .NET developers covering essential security controls, cryptographic functions, and secure coding practices.

urandom vs. CSPRNG
Secure Code Training
urandom vs. CSPRNG for Crypto Keys on SecurityListing: Utilize the kernel's CSPRNG for generating crypto keys instead of userspace CSPRNGs to avoid randomness failures.