Tools and techniques for safeguarding sensitive data and implementing robust encryption. Task: Cryptography
Explore 15 curated tools and resources
OpenFHE is an open-source library implementing post-quantum Fully Homomorphic Encryption schemes with simplified APIs and cross-platform support.
Zama's fhEVM Coprocessor is an open-source tool for developing applications using Fully Homomorphic Encryption, enabling privacy-preserving computations in various domains.
Microsoft SEAL is a homomorphic encryption library that allows computations on encrypted data without decryption, supporting integer and approximate real number arithmetic.
A tool for creating cryptographically strong volumes that destroy themselves upon tampering or via issued command.
A PHP library for secure data encryption with easy-to-use API.
A deep dive into the Ledger connect-kit compromise decryption process.
Showcasing bad cryptography and discussing flawed crypto design.
Clevis is a pluggable framework for automated decryption.
Using high-quality entropy sources for CSPRNG seeding is crucial for security.
Microsoft Azure's dedicated HSM for secure key management and cryptographic operations.
A tool for xor analysis to guess key length and key based on most frequent characters.
A utility tool for decrypting data from weak public keys and attempting to recover the corresponding private key, primarily for educational purposes.
Themis provides strong, usable cryptography for busy people.
A tool for breaking crypto and identifying weak cryptosystems, with a humorous name and a separate library called Cryptanalib.
An AI-powered career platform that automates the creation of cybersecurity job application materials and provides company-specific insights for job seekers.
An AI-driven data classification and governance platform that automatically discovers, analyzes, and labels sensitive information while providing risk management and compliance capabilities.
An AI-powered platform that automates threat hunting and analysis by processing cyber threat intelligence and generating customized hunt packages for SOC teams.
Aikido is an all-in-one security platform that combines multiple security scanning and management functions for cloud-native applications and infrastructure.
Permiso is an Identity Threat Detection and Response platform that provides comprehensive visibility and protection for identities across multiple cloud environments.
Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.