Cryptography
Browse 11 cybersecurity tools tagged with "Cryptography"
CRT sh
Certificate Lifecycle Management
CRT sh on SecurityListing: Crt.sh is a website that allows users to search for SSL/TLS certificates of a targeted domain, providing transparency into certificate logs.
Crypto Drainer Attack
Write-ups
Crypto Drainer Attack on SecurityListing: A deep dive into the Ledger connect-kit compromise decryption process.
The Matasano Crypto
Secure Code Training
The Matasano Crypto Challenges on SecurityListing: A set of 48 practical programming exercises in cryptography and application security
OpenFHE
Data Masking
OpenFHE on SecurityListing: OpenFHE is an open-source library implementing post-quantum Fully Homomorphic Encryption schemes with simplified APIs and cross-platform support.
eShard esDynamic
Penetration Testing
eShard esDynamic on SecurityListing: Platform for chip security testing and binary security analysis
Entropy Source Evaluation
Static Application Security Testing
Entropy Source Evaluation on SecurityListing: Using high-quality entropy sources for CSPRNG seeding is crucial for security.
Accutive Security
Key Management
Accutive Security on SecurityListing: Cryptography and IAM consulting services with PKI and certificate mgmt.
SCANOSS Encryption Dataset
Risk Assessment
SCANOSS Encryption Dataset on SecurityListing: Identifies cryptographic algorithms and libraries in code for compliance
Wireguard
VPN
Wireguard on SecurityListing: Fast, simple, and secure VPN that uses cutting-edge cryptography
Security Driven .NET
Guides
Security Driven .NET on SecurityListing: A practical security handbook for .NET developers covering essential security controls, cryptographic functions, and secure coding practices.
urandom vs. CSPRNG
Secure Code Training
urandom vs. CSPRNG for Crypto Keys on SecurityListing: Utilize the kernel's CSPRNG for generating crypto keys instead of userspace CSPRNGs to avoid randomness failures.