issues
search
veorq
/
cryptocoding
Guidelines for low-level cryptography software
1.11k
stars
90
forks
source link
issues
Newest
Newest
Most commented
Recently updated
Oldest
Least commented
Least recently updated
Typo: closing parenthesis
#25
skaunov
closed
1 year ago
0
Update on memory leaking technologies
#24
vt-alt
closed
2 years ago
1
On most operating systems memory owned by one process can be reused by another
#23
vt-alt
closed
2 years ago
5
OpenBSD: Suggest using userspace PRNG where appropriate.
#22
diagprov
closed
3 years ago
0
Trade
#21
boss562
closed
3 years ago
0
Jay
#20
boss562
closed
3 years ago
0
Eth
#19
boss562
closed
3 years ago
0
Changed link to NIST's Recommendations for RNGs
#18
Mikerah
closed
4 years ago
0
rand_s
#17
MicheleCicciottiWork
closed
5 years ago
1
Expand memory zeroing function list, add info about getrandom/getentropy on FreeBSD
#16
valpackett
closed
4 years ago
0
Use strong randomness: *NIX randomness issues
#15
xorhash
opened
5 years ago
0
left-shift int promotion
#14
kaworu
closed
5 years ago
1
change select to mimic ct_select_u32 behaviour
#13
kaworu
closed
5 years ago
2
rename crypto_verify to crypto_verify_16
#12
kaworu
closed
5 years ago
0
Replace the memcmp example
#11
kaworu
closed
5 years ago
0
Bad solution for "use strong randomness"
#10
Sc00bz
opened
5 years ago
0
Compare secret strings in constant time
#9
AndreasBriese
opened
5 years ago
1
Mistype: extra slash after /dev/urandom
#8
dgpv
closed
5 years ago
1
Link to "Analysis of the OpenSSL random API" broken
#7
dgpv
closed
5 years ago
1
structure/organize the randomness section
#6
veorq
opened
5 years ago
0
add entry about randomness/nonce reuse
#5
veorq
opened
5 years ago
0
Maybe note that RDRAND may happen to be buggy
#4
dgpv
opened
5 years ago
0
add entry about secure sampling
#3
veorq
opened
5 years ago
0
Mention Linux' getrandom() and OpenSSL's RAND_bytes()
#2
veorq
closed
5 years ago
1
visual fxs
#1
vixentael
closed
5 years ago
0