JoseswiftA framework for the JOSE standards JWS, JWE, and JWK written in Swift.
Stars: ✭ 114 (-42.71%)
CryptionIn-Browser AES File Encryption 🔐 with Data Integrity Check 🔍
Stars: ✭ 114 (-42.71%)
ShamirA Java implementation of Shamir's Secret Sharing algorithm over GF(256).
Stars: ✭ 153 (-23.12%)
Node Webcrypto OsslA WebCrypto Polyfill for Node in TypeScript built on OpenSSL.
Stars: ✭ 113 (-43.22%)
Node Sha3SHA3 for JavaScript - The Keccak family of hash algorithms
Stars: ✭ 112 (-43.72%)
CypherPythonic ransomware proof of concept.
Stars: ✭ 178 (-10.55%)
Mixplaintext可对 Xcode 项目工程所有的 objective-c 文件内包含的明文进行加密混淆,提高逆向分析难度。
Stars: ✭ 152 (-23.62%)
StreamcryptorStream encryption & decryption with libsodium and protobuf
Stars: ✭ 112 (-43.72%)
IostreamsIOStreams is an incredibly powerful streaming library that makes changes to file formats, compression, encryption, or storage mechanism transparent to the application.
Stars: ✭ 84 (-57.79%)
CurvRust language general purpose elliptic curve cryptography.
Stars: ✭ 138 (-30.65%)
LolΛ ⚬ λ: Functional Lattice Cryptography
Stars: ✭ 169 (-15.08%)
FrescoA FRamework for Efficient Secure COmputation
Stars: ✭ 83 (-58.29%)
Encryptedrmd🔑 Password protected markdown html reports in R using libsodium
Stars: ✭ 136 (-31.66%)
Tools For CryptanalysisA repository that aims to provide tools for cryptography and cryptanalysis
Stars: ✭ 112 (-43.72%)
React Native Encrypted StorageReact Native wrapper around SharedPreferences and Keychain to provide a secure alternative to Async Storage
Stars: ✭ 110 (-44.72%)
EncpipeThe dum^H^H^Hsimplest encryption tool in the world.
Stars: ✭ 135 (-32.16%)
WycheproofProject Wycheproof tests crypto libraries against known attacks.
Stars: ✭ 2,299 (+1055.28%)
Poodle Poc🐩 Poodle (Padding Oracle On Downgraded Legacy Encryption) attack CVE-2014-3566 🐩
Stars: ✭ 198 (-0.5%)
BasecrackDecode All Bases - Base Scheme Decoder
Stars: ✭ 196 (-1.51%)
DatashSend and Receive files directly from your browser with end-to-end encryption
Stars: ✭ 178 (-10.55%)
SputterEthereum Virtual Machine (EVM) implementation
Stars: ✭ 111 (-44.22%)
PyceEncrypted Python Execution
Stars: ✭ 111 (-44.22%)
Bitcoinecdsa.phpPHP library to generate BTC addresses and signatures from private keys.
Stars: ✭ 169 (-15.08%)
Recrypt RsA set of cryptographic primitives for building a multi-hop Proxy Re-encryption scheme, known as Transform Encryption.
Stars: ✭ 81 (-59.3%)
Tiny KeccakAn implementation of Keccak derived functions specified in FIPS-202, SP800-185 and KangarooTwelve
Stars: ✭ 134 (-32.66%)
RingSafe, fast, small crypto using Rust
Stars: ✭ 2,553 (+1182.91%)
Mutual Tls Ssl🔐 Tutorial of setting up Security for your API with one way authentication with TLS/SSL and mutual mutual authentication for a java based web server and a client with both Spring Boot. Different clients are provided such as Apache HttpClient, OkHttp, Spring RestTemplate, Spring WebFlux WebClient Jetty and Netty, the old and the new JDK HttpClient, the old and the new Jersey Client, Google HttpClient, Unirest, Retrofit, Feign, Methanol, vertx, Scala client Finagle, Featherbed, Dispatch Reboot, AsyncHttpClient, Sttp, Akka, Requests Scala, Http4s Blaze, Kotlin client Fuel, http4k, Kohttp and ktor. Also other server examples are available such as jersey with grizzly. Also gRPC examples are included
Stars: ✭ 163 (-18.09%)
Etebase RsA Rust client library for Etebase
Stars: ✭ 78 (-60.8%)
Sodium PlusDeveloper-friendly libsodium interface
Stars: ✭ 132 (-33.67%)
AcvpIndustry Working Group on Automated Cryptographic Algorithm Validation
Stars: ✭ 76 (-61.81%)
BotanCryptography Toolkit
Stars: ✭ 1,798 (+803.52%)
BtBitTorrent library and client with DHT, magnet links, encryption and more
Stars: ✭ 2,011 (+910.55%)
LibblsBLS signatures, threshold encryption, distributed key generation library in modern C++. Actively maintained and used by SKALE for consensus, distributed random number gen, inter-chain communication and protection of transactions. BLS threshold signatures can be verified in Solidity, and used as random beacon (common coin)
Stars: ✭ 74 (-62.81%)
KnobKey Negotiation Of Bluetooth (KNOB) attacks on Bluetooth BR/EDR and BLE [CVE-2019-9506]
Stars: ✭ 131 (-34.17%)
Firmware❄️ Firmware and simulator for Coldcard Hardware Wallet
Stars: ✭ 198 (-0.5%)
Jose2goGolang (GO) implementation of Javascript Object Signing and Encryption specification
Stars: ✭ 150 (-24.62%)
WolfbootwolfBoot is a portable, OS-agnostic, secure bootloader for microcontrollers, supporting firmware authentication and firmware update mechanisms.
Stars: ✭ 110 (-44.72%)
VeracruzMain repository for the Veracruz privacy-preserving compute project.
Stars: ✭ 71 (-64.32%)
Merkle TreeMerkle Trees and Merkle Inclusion Proofs
Stars: ✭ 130 (-34.67%)
SigfwOpen Source Signaling Firewall for SS7, Diameter filtering, antispoof and antisniff
Stars: ✭ 71 (-64.32%)
Bouncy GpgMake using Bouncy Castle with OpenPGP fun again!
Stars: ✭ 164 (-17.59%)
Libsodium DocGitbook documentation for libsodium
Stars: ✭ 129 (-35.18%)
Pwd.shGPG symmetric password manager
Stars: ✭ 1,468 (+637.69%)
Auth AdtAuthenticated Data Structures Generically
Stars: ✭ 150 (-24.62%)
Yubikey Agentyubikey-agent is a seamless ssh-agent for YubiKeys.
Stars: ✭ 1,744 (+776.38%)
Crypto BenchBenchmarks for crypto libraries (in Rust, or with Rust bindings)
Stars: ✭ 67 (-66.33%)
UnderlockUnderlock makes it dead simple to encrypt and decrypt your data and files. It comes with little to no dependencies and has a very small API surface.
Stars: ✭ 128 (-35.68%)
Crypto AsyncFast, reliable cipher, hash and hmac methods executed in Node's threadpool for multi-core throughput.
Stars: ✭ 161 (-19.1%)
Chinese Cipher Of Sm2 Sm3 Sm4This is an android-project about sending messages after encryption or getting cipher text from message database of mobile phone.U could also get the original points through your secret key
Stars: ✭ 109 (-45.23%)
StaticryptPassword protect a static HTML page
Stars: ✭ 2,280 (+1045.73%)
Ipfs WormholeGet things from one computer to another, safely. Over IPFS (which not even required to receive those things).
Stars: ✭ 107 (-46.23%)
Cedarkey$2 hardware SSH keys storage
Stars: ✭ 148 (-25.63%)
Torus NodeTorus nodes run a Distributed Key Generation protocol amongst themselves that allows for the generation, storage and assignment of cryptographic keys
Stars: ✭ 148 (-25.63%)
Libsodium GoA complete overhaul of the Golang wrapper for libsodium
Stars: ✭ 105 (-47.24%)
FinalcryptFinalCrypt - The World's Strongest Encryption
Stars: ✭ 104 (-47.74%)