Swift CryptoOpen-source implementation of a substantial portion of the API of Apple CryptoKit suitable for use on Linux platforms.
Stars: ✭ 1,005 (+1951.02%)
Ciphey⚡ Automatically decrypt encryptions without knowing the key or cipher, decode encodings, and crack hashes ⚡
Stars: ✭ 9,116 (+18504.08%)
PowersoftauAn independent implementation of the Powers of Tau MPC ceremony.
Stars: ✭ 32 (-34.69%)
LiboqsC library for prototyping and experimenting with quantum-resistant cryptography
Stars: ✭ 775 (+1481.63%)
Wyhash Rswyhash fast portable non-cryptographic hashing algorithm and random number generator in Rust
Stars: ✭ 44 (-10.2%)
PynaclPython binding to the Networking and Cryptography (NaCl) library
Stars: ✭ 761 (+1453.06%)
Claimchain CoreA core and experimental implementation of ClaimChain
Stars: ✭ 30 (-38.78%)
Sodium compatPure PHP polyfill for ext/sodium
Stars: ✭ 736 (+1402.04%)
CryptonLibrary consisting of explanation and implementation of all the existing attacks on various Encryption Systems, Digital Signatures, Key Exchange, Authentication methods along with example challenges from CTFs
Stars: ✭ 995 (+1930.61%)
KeysKey management is hard
Stars: ✭ 733 (+1395.92%)
Lethean VpnLethean Virtual Private Network (VPN)
Stars: ✭ 29 (-40.82%)
Blockchain📖Code for Blockchain Demo
Stars: ✭ 717 (+1363.27%)
Al Go Rithms🎵 Algorithms written in different programming languages - https://zoranpandovski.github.io/al-go-rithms/
Stars: ✭ 1,036 (+2014.29%)
MaskbookThe portal to the new, open internet. ([I:b])
Stars: ✭ 691 (+1310.2%)
Sephia FiveA secure and PGP enabled webmail module for Phosphorus Five
Stars: ✭ 21 (-57.14%)
Mirage CryptoCryptographic primitives for MirageOS
Stars: ✭ 39 (-20.41%)
Libsodium.jslibsodium compiled to Webassembly and pure JavaScript, with convenient wrappers.
Stars: ✭ 665 (+1257.14%)
Curl CollisionsAn implementation of Heilman et al.'s differential attack on IOTA's Curl hashing function.
Stars: ✭ 20 (-59.18%)
HashesCollection of cryptographic hash functions written in pure Rust
Stars: ✭ 649 (+1224.49%)
Cryptojs.swiftCross-platform cryptographic functions in swift
Stars: ✭ 42 (-14.29%)
SirixSirixDB is a temporal, evolutionary database system, which uses an accumulate only approach. It keeps the full history of each resource. Every commit stores a space-efficient snapshot through structural sharing. It is log-structured and never overwrites data. SirixDB uses a novel page-level versioning approach called sliding snapshot.
Stars: ✭ 638 (+1202.04%)
Java Crypto UtilsJava Cryptographic, Encoding and Hash Utilities
Stars: ✭ 15 (-69.39%)
CryptomatorMulti-platform transparent client-side encryption of your files in the cloud
Stars: ✭ 6,623 (+13416.33%)
Awesome Crypto PapersA curated list of cryptography papers, articles, tutorials and howtos.
Stars: ✭ 985 (+1910.2%)
Darkwire.ioEnd-to-end encrypted instant web chat
Stars: ✭ 594 (+1112.24%)
FeatherdusterAn automated, modular cryptanalysis tool; i.e., a Weapon of Math Destruction
Stars: ✭ 876 (+1687.76%)
Omemo TopTracking the Progress of OMEMO Integration in various clients
Stars: ✭ 47 (-4.08%)
Deep MihashCode for papers "Hashing with Mutual Information" (TPAMI 2019) and "Hashing with Binary Matrix Pursuit" (ECCV 2018)
Stars: ✭ 13 (-73.47%)
Lazy importerlibrary for importing functions from dlls in a hidden, reverse engineer unfriendly way
Stars: ✭ 544 (+1010.2%)
LibpkiEasy-to-use high-level library for PKI-enabled applications
Stars: ✭ 36 (-26.53%)
GrinMinimal implementation of the Mimblewimble protocol.
Stars: ✭ 4,897 (+9893.88%)
Blog SrcPersonal blog source.
Stars: ✭ 7 (-85.71%)
FiroThe privacy-focused cryptocurrency
Stars: ✭ 528 (+977.55%)
CryptocatSecure chat software for your computer.
Stars: ✭ 1,011 (+1963.27%)
SnarkInterfaces for Relations and SNARKs for these relations
Stars: ✭ 509 (+938.78%)
Polpol /pɵl/ is a modern command line password manager with deniable encryption
Stars: ✭ 25 (-48.98%)
Iotex CoreOfficial implementation of IoTeX blockchain protocol in Go.
Stars: ✭ 505 (+930.61%)
CryptoanalysisCogniCrypt_SAST: CrySL-to-Static Analysis Compiler
Stars: ✭ 36 (-26.53%)
AesAES-128 hardware implementation
Stars: ✭ 25 (-48.98%)
MundaneMundane is a Rust cryptography library backed by BoringSSL that is difficult to misuse, ergonomic, and performant (in that order).
Stars: ✭ 1,033 (+2008.16%)
Java Competitive ProgrammingI have written some important Algorithms and Data Structures in an efficient way in Java with proper references to time and space complexity. These Pre-cooked and well-tested codes help to implement larger hackathon problems in lesser time. DFS, BFS, LCA, All Pair Shortest Path, Longest Common Subsequence, Binary Search, Lower Bound Search, Maximal Matching, Matrix Exponentiation, Segment Tree, Sparse Table, Merge Sort, Miller Prime Test, Prims - Minimum Spanning Tree, BIT - Binary Index Tree, Two Pointers, BST - Binary Search Tree, Maximum Subarray Sum, Immutable Data Structures, Persistent Data Structurs - Persistent Trie, Dijkstra, Z - Function, Minimum Cost Maximal Matching, Heavy Light Decomposition, Knapsack, Suffix Array and LCP - Longest Common Prefix, Squre Root Decomposition, Kth Order Statics, Trie / Prefix Tree, LIS - Longest Increasing Subsequence, Hashing
Stars: ✭ 24 (-51.02%)
MetaMeta-repository for Miscreant: misuse-resistant symmetric encryption library with AES-SIV (RFC 5297) and AES-PMAC-SIV support
Stars: ✭ 483 (+885.71%)
CryptographyCryptography Android application code samples / cipher collection for app users
Stars: ✭ 35 (-28.57%)
CirclCIRCL: Cloudflare Interoperable Reusable Cryptographic Library
Stars: ✭ 474 (+867.35%)
Aeternityæternity: solving scalability problems by making sense of state-channels
Stars: ✭ 923 (+1783.67%)
Crypto blogsBlogs about Cryptography/Security to follow
Stars: ✭ 41 (-16.33%)
ElleThe Elle coroutine-based asynchronous C++ development framework.
Stars: ✭ 459 (+836.73%)
GuardedboxOnline client-side manager for secure storage and secrets sharing.
Stars: ✭ 34 (-30.61%)
HbcAPI of homomorphic binary operations such as binary comparisons or binary divisions using the library HElib
Stars: ✭ 23 (-53.06%)
BulletproofsBulletproofs are short non-interactive zero-knowledge proofs that require no trusted setup
Stars: ✭ 458 (+834.69%)
C Sharp Algorithms📚 📈 Plug-and-play class-library project of standard Data Structures and Algorithms in C#
Stars: ✭ 4,684 (+9459.18%)
RhashmapRobin Hood hash map library
Stars: ✭ 33 (-32.65%)
Virgil Crypto PhpVirgil PHP Crypto Library is a high-level cryptographic library that allows you to perform all necessary operations for secure storing and transferring data and everything required to become HIPAA and GDPR compliant.
Stars: ✭ 22 (-55.1%)
Siv ModeRFC 5297 SIV mode of operation in Java
Stars: ✭ 22 (-55.1%)