SsriStandard Subresource Integrity library for Node.js
Stars: ✭ 69 (+40.82%)
WebcryptoW3C Web Cryptography API for Node.js
Stars: ✭ 79 (+61.22%)
Password4jPassword4j is a user-friendly cryptographic library that supports Argon2, Bcrypt, Scrypt, PBKDF2 and various cryptographic hash functions.
Stars: ✭ 124 (+153.06%)
Lazysodium AndroidAn Android implementation of the Libsodium cryptography library. For the lazy dev.
Stars: ✭ 69 (+40.82%)
EasycryptAndroid cryptography library with SecureRandom patches.
Stars: ✭ 102 (+108.16%)
Auth AdtAuthenticated Data Structures Generically
Stars: ✭ 150 (+206.12%)
DatasafeDatasafe - flexible and secure data storage and document sharing using cryptographic message syntax for data encryption
Stars: ✭ 32 (-34.69%)
XortoolA tool to analyze multi-byte xor cipher
Stars: ✭ 993 (+1926.53%)
SupergirloncryptCryptoTrojan in Python (For educational purpose ONLY)
Stars: ✭ 28 (-42.86%)
Cl TlsAn implementation of TLS and related specifications in Common Lisp
Stars: ✭ 32 (-34.69%)
AnonlinkPython implementation of anonymous linkage using cryptographic linkage keys
Stars: ✭ 41 (-16.33%)
IndurativeEasily create authenticated data structures
Stars: ✭ 30 (-38.78%)
GopaqueGo implementation of OPAQUE (hidden password user registration and auth)
Stars: ✭ 43 (-12.24%)
RbnaclRuby FFI binding to the Networking and Cryptography (NaCl) library (a.k.a. libsodium)
Stars: ✭ 910 (+1757.14%)
JoeeccElliptic Curve Cryptography playground/toolkit written in pure Python
Stars: ✭ 46 (-6.12%)
PysyftA library for answering questions using data you cannot see
Stars: ✭ 7,811 (+15840.82%)
Node Argon2Node.js bindings for Argon2 hashing algorithm
Stars: ✭ 1,008 (+1957.14%)
X25519Public key cryptography library for Ruby providing the X25519 Diffie-Hellman function
Stars: ✭ 37 (-24.49%)
EnigmaEnigma cipher tool
Stars: ✭ 13 (-73.47%)
Simon Speck Cexample C language implementation of SIMON and SPECK lightweight block ciphers.
Stars: ✭ 9 (-81.63%)
Parallel XxhashCompute xxHash hash codes for 8 keys in parallel
Stars: ✭ 36 (-26.53%)
IpchainIPChain Core Wallet
Stars: ✭ 26 (-46.94%)
HaliteHigh-level cryptography interface powered by libsodium
Stars: ✭ 933 (+1804.08%)
UfonetUFONet - Denial of Service Toolkit
Stars: ✭ 963 (+1865.31%)
Swift CryptoOpen-source implementation of a substantial portion of the API of Apple CryptoKit suitable for use on Linux platforms.
Stars: ✭ 1,005 (+1951.02%)
PowersoftauAn independent implementation of the Powers of Tau MPC ceremony.
Stars: ✭ 32 (-34.69%)
Wyhash Rswyhash fast portable non-cryptographic hashing algorithm and random number generator in Rust
Stars: ✭ 44 (-10.2%)
Claimchain CoreA core and experimental implementation of ClaimChain
Stars: ✭ 30 (-38.78%)
CryptonLibrary consisting of explanation and implementation of all the existing attacks on various Encryption Systems, Digital Signatures, Key Exchange, Authentication methods along with example challenges from CTFs
Stars: ✭ 995 (+1930.61%)
Lethean VpnLethean Virtual Private Network (VPN)
Stars: ✭ 29 (-40.82%)
Al Go Rithms🎵 Algorithms written in different programming languages - https://zoranpandovski.github.io/al-go-rithms/
Stars: ✭ 1,036 (+2014.29%)
Sephia FiveA secure and PGP enabled webmail module for Phosphorus Five
Stars: ✭ 21 (-57.14%)
Mirage CryptoCryptographic primitives for MirageOS
Stars: ✭ 39 (-20.41%)
Curl CollisionsAn implementation of Heilman et al.'s differential attack on IOTA's Curl hashing function.
Stars: ✭ 20 (-59.18%)
Cryptojs.swiftCross-platform cryptographic functions in swift
Stars: ✭ 42 (-14.29%)
Java Crypto UtilsJava Cryptographic, Encoding and Hash Utilities
Stars: ✭ 15 (-69.39%)
Awesome Crypto PapersA curated list of cryptography papers, articles, tutorials and howtos.
Stars: ✭ 985 (+1910.2%)
FeatherdusterAn automated, modular cryptanalysis tool; i.e., a Weapon of Math Destruction
Stars: ✭ 876 (+1687.76%)
Omemo TopTracking the Progress of OMEMO Integration in various clients
Stars: ✭ 47 (-4.08%)
Deep MihashCode for papers "Hashing with Mutual Information" (TPAMI 2019) and "Hashing with Binary Matrix Pursuit" (ECCV 2018)
Stars: ✭ 13 (-73.47%)
LibpkiEasy-to-use high-level library for PKI-enabled applications
Stars: ✭ 36 (-26.53%)
Blog SrcPersonal blog source.
Stars: ✭ 7 (-85.71%)
CryptocatSecure chat software for your computer.
Stars: ✭ 1,011 (+1963.27%)
Polpol /pɵl/ is a modern command line password manager with deniable encryption
Stars: ✭ 25 (-48.98%)
CryptoanalysisCogniCrypt_SAST: CrySL-to-Static Analysis Compiler
Stars: ✭ 36 (-26.53%)
MundaneMundane is a Rust cryptography library backed by BoringSSL that is difficult to misuse, ergonomic, and performant (in that order).
Stars: ✭ 1,033 (+2008.16%)
AesAES-128 hardware implementation
Stars: ✭ 25 (-48.98%)
KsuidJava implementation of K-Sortable Globally Unique IDs
Stars: ✭ 35 (-28.57%)
StreebogGOST R 34.11-2012: RFC-6986 cryptographic hash function
Stars: ✭ 24 (-51.02%)
Java Competitive ProgrammingI have written some important Algorithms and Data Structures in an efficient way in Java with proper references to time and space complexity. These Pre-cooked and well-tested codes help to implement larger hackathon problems in lesser time. DFS, BFS, LCA, All Pair Shortest Path, Longest Common Subsequence, Binary Search, Lower Bound Search, Maximal Matching, Matrix Exponentiation, Segment Tree, Sparse Table, Merge Sort, Miller Prime Test, Prims - Minimum Spanning Tree, BIT - Binary Index Tree, Two Pointers, BST - Binary Search Tree, Maximum Subarray Sum, Immutable Data Structures, Persistent Data Structurs - Persistent Trie, Dijkstra, Z - Function, Minimum Cost Maximal Matching, Heavy Light Decomposition, Knapsack, Suffix Array and LCP - Longest Common Prefix, Squre Root Decomposition, Kth Order Statics, Trie / Prefix Tree, LIS - Longest Increasing Subsequence, Hashing
Stars: ✭ 24 (-51.02%)
CryptographyCryptography Android application code samples / cipher collection for app users
Stars: ✭ 35 (-28.57%)
Fernet Java8Java 8 implementation of the Fernet Specification
Stars: ✭ 24 (-51.02%)
Aeternityæternity: solving scalability problems by making sense of state-channels
Stars: ✭ 923 (+1783.67%)
Crypto blogsBlogs about Cryptography/Security to follow
Stars: ✭ 41 (-16.33%)
GuardedboxOnline client-side manager for secure storage and secrets sharing.
Stars: ✭ 34 (-30.61%)
HbcAPI of homomorphic binary operations such as binary comparisons or binary divisions using the library HElib
Stars: ✭ 23 (-53.06%)