Pinned Loading
-
remote-timing-attacks-are-practical
remote-timing-attacks-are-practical Public archiveAn attempt to replicate the attack in Brumley and Boneh's "Remote Timing Attacks are Practical" paper. I did not succeed.
-
rc4-key-recovery-attacks
rc4-key-recovery-attacks PublicExploits weaknesses in RC4 to mount a chosen-plaintext attack and recover the private key. The vulnerability is similar to the one used to crack WEP, but it targets schemes where the initialisation…
-
computing-separable-functions-via-gossip
computing-separable-functions-via-gossip PublicImplementation of the algorithm in "Computing separable functions via gossip." by Mosk-Aoyama, Damon, and Devavrat Shah.
Python
-
firefox-command-palette
firefox-command-palette PublicControl Firefox with Sublime/helm-M-x style fuzzy complete. Use it from the omnibar with the ; search prefix, or trigger a pop-up with Ctrl+Space.
Something went wrong, please refresh the page to try again.
If the problem persists, check the GitHub status page or contact support.
If the problem persists, check the GitHub status page or contact support.