Safe Compare

Constant-time comparison algorithm to prevent timing attacks
Alternatives To Safe Compare
Project NameStarsDownloadsRepos Using ThisPackages Using ThisMost Recent CommitTotal ReleasesLatest ReleaseOpen IssuesLicenseLanguage
3a year ago2June 01, 201510mitC++
A tool to exploit the hash length extension attack in various hashing algorithms
Simple Cryptography32
4 years agomitPython
Scripts that illustrate basic cryptography concepts based on Coursera Standford Cryptography I course and more.
Md5305584675 years ago18November 01, 20191otherRust
MD5 hash function
Hawk I28
6 years ago1Python
Automatic extract anomalious Web attack Payloads with Unsupervised Machine Learning algorithms
10 years agocc0-1.0Python
ZIP encryption info
Safe Compare2551639 months ago9March 01, 20191mitJavaScript
Constant-time comparison algorithm to prevent timing attacks
Nslkdd Dataset24
6 years ago1mit
NSLKDD Dataset for WEKA
3 years ago5Python
This repository contains the official PyTorch implementation of GeoDA algorithm. GeoDA is a Black-box attack to generate adversarial example for image classifiers.
Adversarial Point Perturbations On 3d Objects19
4 years ago4Python
New distributional and shape attacks on neural networks that process 3D point cloud data.
Pbcs171613 years ago5June 02, 2021apache-2.0Elixir
Alternatives To Safe Compare
Select To Compare

Alternative Project Comparisons
Popular Attack Projects
Popular Algorithms Projects
Popular Security Categories
Related Searches

Get A Weekly Email With Trending Projects For These Categories
No Spam. Unsubscribe easily at any time.