Sodium PlusDeveloper-friendly libsodium interface
Stars: ✭ 132 (-28.65%)
KcptunA Stable & Secure Tunnel based on KCP with N:M multiplexing and FEC. Available for ARM, MIPS, 386 and AMD64。KCPプロトコルに基づく安全なトンネル。KCP 프로토콜을 기반으로 하는 보안 터널입니다。
Stars: ✭ 12,714 (+6772.43%)
BotanCryptography Toolkit
Stars: ✭ 1,798 (+871.89%)
ShamirA Java implementation of Shamir's Secret Sharing algorithm over GF(256).
Stars: ✭ 153 (-17.3%)
Merkle TreeMerkle Trees and Merkle Inclusion Proofs
Stars: ✭ 130 (-29.73%)
X25519 DalekX25519 elliptic curve Diffie-Hellman key exchange in pure-Rust, using curve25519-dalek.
Stars: ✭ 179 (-3.24%)
Demo Twilio Backend NodejsA sample backend that demonstrates how to generate a Virgil JWT and Twilio token used for authentication with the Virgil and Twilio services
Stars: ✭ 128 (-30.81%)
Auth AdtAuthenticated Data Structures Generically
Stars: ✭ 150 (-18.92%)
Torchbear🔥🐻 The Speakeasy Scripting Engine Which Combines Speed, Safety, and Simplicity
Stars: ✭ 128 (-30.81%)
LolΛ ⚬ λ: Functional Lattice Cryptography
Stars: ✭ 169 (-8.65%)
Torus NodeTorus nodes run a Distributed Key Generation protocol amongst themselves that allows for the generation, storage and assignment of cryptographic keys
Stars: ✭ 148 (-20%)
CryloggerCRYLOGGER: Detecting Crypto Misuses for Android and Java Apps Dynamically
Stars: ✭ 125 (-32.43%)
JavasecurityJava web and command line applications demonstrating various security topics
Stars: ✭ 182 (-1.62%)
Noise.NET Standard 1.3 implementation of the Noise Protocol Framework (revision 33 of the spec)
Stars: ✭ 124 (-32.97%)
Branca🔑 Secure alternative to JWT. Authenticated Encrypted API Tokens for Go.
Stars: ✭ 147 (-20.54%)
I2pd🛡 I2P: End-to-End encrypted and anonymous Internet
Stars: ✭ 1,796 (+870.81%)
Bitcoinecdsa.phpPHP library to generate BTC addresses and signatures from private keys.
Stars: ✭ 169 (-8.65%)
Chromium GostChromium с поддержкой алгоритмов ГОСТ
Stars: ✭ 123 (-33.51%)
CryptokernelA SDK for implementing blockchain-based digital currencies
Stars: ✭ 146 (-21.08%)
PycryptodomeA self-contained cryptographic library for Python
Stars: ✭ 1,817 (+882.16%)
StegcloakHide secrets with invisible characters in plain text securely using passwords 🧙🏻♂️⭐
Stars: ✭ 2,379 (+1185.95%)
CruzbitA simple decentralized peer-to-peer ledger implementation
Stars: ✭ 118 (-36.22%)
Wasm CryptoA WebAssembly (via AssemblyScript) set of cryptographic primitives for building authentication and key exchange protocols.
Stars: ✭ 146 (-21.08%)
Solar🌞 Stellar wallet. Secure and user-friendly.
Stars: ✭ 117 (-36.76%)
KesKES is a simple, stateless and distributed key-management system
Stars: ✭ 168 (-9.19%)
Open Crypto🔑 Hashing (BCrypt, SHA2, HMAC), encryption (AES), public-key (RSA), and random data generation.
Stars: ✭ 115 (-37.84%)
TinkTink is a multi-language, cross-platform, open source library that provides cryptographic APIs that are secure, easy to use correctly, and hard(er) to misuse.
Stars: ✭ 11,855 (+6308.11%)
RsactftoolRSA attack tool (mainly for ctf) - retreive private key from weak public key and/or uncipher data
Stars: ✭ 3,163 (+1609.73%)
GitpassOpen Source Your Password (Mismanagement)!
Stars: ✭ 113 (-38.92%)
StreamcryptorStream encryption & decryption with libsodium and protobuf
Stars: ✭ 112 (-39.46%)
Pass WinmenuAn easy-to-use Windows interface for pass
Stars: ✭ 160 (-13.51%)
SputterEthereum Virtual Machine (EVM) implementation
Stars: ✭ 111 (-40%)
Dumb CryptoDumb, but easily verifiable implementations of crypto algorithms
Stars: ✭ 137 (-25.95%)
WolfbootwolfBoot is a portable, OS-agnostic, secure bootloader for microcontrollers, supporting firmware authentication and firmware update mechanisms.
Stars: ✭ 110 (-40.54%)
MagicpadMagicPad is an encryption suite for beginners. It is designed to be run standalone via the browser or executable (Electron).
Stars: ✭ 174 (-5.95%)
NoiseprotocolNoise Protocol Framework - Python 3 implementation
Stars: ✭ 142 (-23.24%)
CryfsCryptographic filesystem for the cloud
Stars: ✭ 1,560 (+743.24%)
Libsodium Jni(Android) Networking and Cryptography Library (NaCL) JNI binding. JNI is utilized for fastest access to native code. Accessible either in Android or Java application. Uses SWIG to generate Java JNI bindings. SWIG definitions are extensible to other languages.
Stars: ✭ 157 (-15.14%)
Scrypt JsPure JavaScript implementation of the scrypt password-based key derivation function.
Stars: ✭ 103 (-44.32%)
Crypto1 bsBitsliced Crypto-1 brute-forcer
Stars: ✭ 140 (-24.32%)
Coniks GoA CONIKS implementation in Golang
Stars: ✭ 102 (-44.86%)
Sboot stm32Secure USB DFU1.1 bootloader for STM32
Stars: ✭ 181 (-2.16%)
BrightidReference mobile app for BrightID
Stars: ✭ 101 (-45.41%)
TrussedModern Cryptographic Firmware
Stars: ✭ 140 (-24.32%)
Pyjksa pure python Java KeyStore file parser, including private key decryption
Stars: ✭ 100 (-45.95%)
MemguardSecure software enclave for storage of sensitive information in memory.
Stars: ✭ 2,036 (+1000.54%)
Crypto RnnLearning the Enigma with Recurrent Neural Networks
Stars: ✭ 139 (-24.86%)
JmacaroonsPure Java implementation of Macaroons: Cookies with Contextual Caveats for Decentralized Authorization in the Cloud. Android ready. Online playground available.
Stars: ✭ 100 (-45.95%)
LibraryCollection of papers in the field of distributed systems, game theory, cryptography, cryptoeconomics, zero knowledge
Stars: ✭ 100 (-45.95%)
ChurpDecentralize your secrets!
Stars: ✭ 100 (-45.95%)
BluecryptorSwift cross-platform crypto library using CommonCrypto/libcrypto
Stars: ✭ 171 (-7.57%)
Practical Cryptography For Developers BookPractical Cryptography for Developers: Hashes, MAC, Key Derivation, DHKE, Symmetric and Asymmetric Ciphers, Public Key Cryptosystems, RSA, Elliptic Curves, ECC, secp256k1, ECDH, ECIES, Digital Signatures, ECDSA, EdDSA
Stars: ✭ 2,400 (+1197.3%)
Sheep WolfWolves Among the Sheep
Stars: ✭ 138 (-25.41%)
JavascriptA repository for All algorithms implemented in Javascript (for educational purposes only)
Stars: ✭ 16,117 (+8611.89%)
Hacl StarHACL*, a formally verified cryptographic library written in F*
Stars: ✭ 1,360 (+635.14%)
SubtlePure-Rust traits and utilities for constant-time cryptographic implementations.
Stars: ✭ 157 (-15.14%)
CurvRust language general purpose elliptic curve cryptography.
Stars: ✭ 138 (-25.41%)