Curl CollisionsAn implementation of Heilman et al.'s differential attack on IOTA's Curl hashing function.
Stars: ✭ 20 (-62.26%)
VuvuzelaPrivate messaging system that hides metadata
Stars: ✭ 2,423 (+4471.7%)
Fhe Toolkit LinuxIBM Fully Homomorphic Encryption Toolkit For Linux. This toolkit is a Linux based Docker container that demonstrates computing on encrypted data without decrypting it! The toolkit ships with two demos including a fully encrypted Machine Learning inference with a Neural Network and a Privacy-Preserving key-value search.
Stars: ✭ 1,123 (+2018.87%)
BitcrackerBitCracker is the first open source password cracking tool for memory units encrypted with BitLocker
Stars: ✭ 463 (+773.58%)
AlignmentdurationLyrics-to-audio-alignement system. Based on Machine Learning Algorithms: Hidden Markov Models with Viterbi forced alignment. The alignment is explicitly aware of durations of musical notes. The phonetic model are classified with MLP Deep Neural Network.
Stars: ✭ 36 (-32.08%)
CryptographyCryptography Android application code samples / cipher collection for app users
Stars: ✭ 35 (-33.96%)
UfonetUFONet - Denial of Service Toolkit
Stars: ✭ 963 (+1716.98%)
JoeeccElliptic Curve Cryptography playground/toolkit written in pure Python
Stars: ✭ 46 (-13.21%)
Swift CryptoOpen-source implementation of a substantial portion of the API of Apple CryptoKit suitable for use on Linux platforms.
Stars: ✭ 1,005 (+1796.23%)
Claimchain CoreA core and experimental implementation of ClaimChain
Stars: ✭ 30 (-43.4%)
X25519Public key cryptography library for Ruby providing the X25519 Diffie-Hellman function
Stars: ✭ 37 (-30.19%)
CapsgnnA PyTorch implementation of "Capsule Graph Neural Network" (ICLR 2019).
Stars: ✭ 1,008 (+1801.89%)
CryptoanalysisCogniCrypt_SAST: CrySL-to-Static Analysis Compiler
Stars: ✭ 36 (-32.08%)
Al Go Rithms🎵 Algorithms written in different programming languages - https://zoranpandovski.github.io/al-go-rithms/
Stars: ✭ 1,036 (+1854.72%)
OphidianOphidian's Mirror Repository on github. https://gitlab.com/eclufsc/eda/ophidian
Stars: ✭ 32 (-39.62%)
Crypto blogsBlogs about Cryptography/Security to follow
Stars: ✭ 41 (-22.64%)
PowersoftauAn independent implementation of the Powers of Tau MPC ceremony.
Stars: ✭ 32 (-39.62%)
AnonlinkPython implementation of anonymous linkage using cryptographic linkage keys
Stars: ✭ 41 (-22.64%)
Lethean VpnLethean Virtual Private Network (VPN)
Stars: ✭ 29 (-45.28%)
Sephia FiveA secure and PGP enabled webmail module for Phosphorus Five
Stars: ✭ 21 (-60.38%)
RbnaclRuby FFI binding to the Networking and Cryptography (NaCl) library (a.k.a. libsodium)
Stars: ✭ 910 (+1616.98%)
Write Ups📚 VoidHack CTF write-ups
Stars: ✭ 45 (-15.09%)
CryptonLibrary consisting of explanation and implementation of all the existing attacks on various Encryption Systems, Digital Signatures, Key Exchange, Authentication methods along with example challenges from CTFs
Stars: ✭ 995 (+1777.36%)
Fast prototypeThis is a machine learning framework that enables developers to iterate fast over different ML architecture designs.
Stars: ✭ 15 (-71.7%)
Neural Architecture Search With RlMinimal Tensorflow implementation of the paper "Neural Architecture Search With Reinforcement Learning" presented at ICLR 2017
Stars: ✭ 37 (-30.19%)
Cryptojs.swiftCross-platform cryptographic functions in swift
Stars: ✭ 42 (-20.75%)
LibpkiEasy-to-use high-level library for PKI-enabled applications
Stars: ✭ 36 (-32.08%)
ExonumAn extensible open-source framework for creating private/permissioned blockchain applications
Stars: ✭ 1,037 (+1856.6%)
How2sketchCode for paper “How2Sketch: generating easy-to-follow tutorials for sketching 3D objects.” I3D (2017)
Stars: ✭ 36 (-32.08%)
CryptocatSecure chat software for your computer.
Stars: ✭ 1,011 (+1807.55%)
KsuidJava implementation of K-Sortable Globally Unique IDs
Stars: ✭ 35 (-33.96%)
Holodeck EngineHigh Fidelity Simulator for Reinforcement Learning and Robotics Research.
Stars: ✭ 48 (-9.43%)
GuardedboxOnline client-side manager for secure storage and secrets sharing.
Stars: ✭ 34 (-35.85%)
Openpmd Viewer🐍 Python visualization tools for openPMD files
Stars: ✭ 41 (-22.64%)
Nim LibsodiumNim wrapper for the libsodium library
Stars: ✭ 32 (-39.62%)
Latex ExamplesExamples for the usage of LaTeX
Stars: ✭ 1,032 (+1847.17%)
Cl TlsAn implementation of TLS and related specifications in Common Lisp
Stars: ✭ 32 (-39.62%)
Simple CryptographyScripts that illustrate basic cryptography concepts based on Coursera Standford Cryptography I course and more.
Stars: ✭ 40 (-24.53%)
DatasafeDatasafe - flexible and secure data storage and document sharing using cryptographic message syntax for data encryption
Stars: ✭ 32 (-39.62%)
IndurativeEasily create authenticated data structures
Stars: ✭ 30 (-43.4%)
IngraphIncremental view maintenance for openCypher graph queries.
Stars: ✭ 40 (-24.53%)
SupergirloncryptCryptoTrojan in Python (For educational purpose ONLY)
Stars: ✭ 28 (-47.17%)
MundaneMundane is a Rust cryptography library backed by BoringSSL that is difficult to misuse, ergonomic, and performant (in that order).
Stars: ✭ 1,033 (+1849.06%)
Arpspoof arpspoof for macOS - intercept packets on a switched LAN
Stars: ✭ 40 (-24.53%)
PysyftA library for answering questions using data you cannot see
Stars: ✭ 7,811 (+14637.74%)
KeysUncomplicated cryptography frameworks base on CommonCrypto
Stars: ✭ 47 (-11.32%)
Java Crypto UtilsJava Cryptographic, Encoding and Hash Utilities
Stars: ✭ 15 (-71.7%)
XortoolA tool to analyze multi-byte xor cipher
Stars: ✭ 993 (+1773.58%)
Timeless Timing AttacksA Python implementation that facilitates finding timeless timing attack vulnerabilities.
Stars: ✭ 45 (-15.09%)
FeatherdusterAn automated, modular cryptanalysis tool; i.e., a Weapon of Math Destruction
Stars: ✭ 876 (+1552.83%)
Mirage CryptoCryptographic primitives for MirageOS
Stars: ✭ 39 (-26.42%)
EnigmaEnigma cipher tool
Stars: ✭ 13 (-75.47%)
CognicryptCogniCrypt is an Eclipse plugin that supports Java developers in using Java Cryptographic APIs.
Stars: ✭ 50 (-5.66%)