IndurativeEasily create authenticated data structures
Stars: ✭ 30 (-73.21%)
AhashaHash is a non-cryptographic hashing algorithm that uses the AES hardware instruction
Stars: ✭ 251 (+124.11%)
LibsodiumA modern, portable, easy to use crypto library.
Stars: ✭ 9,782 (+8633.93%)
sidh-rsSupersingular Isogeny Diffie-Hellman in Rust
Stars: ✭ 12 (-89.29%)
SupergirloncryptCryptoTrojan in Python (For educational purpose ONLY)
Stars: ✭ 28 (-75%)
cryptographyCryptography course slides at Harbin Institute of Technology
Stars: ✭ 86 (-23.21%)
Crypto BenchBenchmarks for crypto libraries (in Rust, or with Rust bindings)
Stars: ✭ 67 (-40.18%)
WyhashA pure-Go wyhash implementation.
Stars: ✭ 21 (-81.25%)
PyceEncrypted Python Execution
Stars: ✭ 111 (-0.89%)
Signature BaseSignature base for my scanner tools
Stars: ✭ 1,212 (+982.14%)
Wyhash Rswyhash fast portable non-cryptographic hashing algorithm and random number generator in Rust
Stars: ✭ 44 (-60.71%)
Search That Hash🔎Searches Hash APIs to crack your hash quickly🔎 If hash is not found, automatically pipes into HashCat⚡
Stars: ✭ 466 (+316.07%)
WeDPR-Lab-Java-SDKJava SDK of WeDPR-Lab-Core; WeDPR即时可用场景式隐私保护高效解决方案核心算法组件通用Java SDK
Stars: ✭ 18 (-83.93%)
Hashapi Lib NodeTierion Hash API client library for Node.js
Stars: ✭ 20 (-82.14%)
he-toolkitThe Intel Homomorphic Encryption (HE) toolkit is the primordial vehicle for the continuous distribution of the Intel HE technological innovation to users. The toolkit has been designed with usability in mind and to make it easier for users to evaluate and deploy homomorphic encryption technology on the Intel platforms.
Stars: ✭ 40 (-64.29%)
BiddleSelf-hosted application distribution
Stars: ✭ 66 (-41.07%)
kyber-k2soGo implementation of the Kyber (version 3) post-quantum IND-CCA2 KEM.
Stars: ✭ 23 (-79.46%)
gottsA blockchain for non-collateralized stable-coins, follow MimbleWimble protocol but with explicit amount.
Stars: ✭ 48 (-57.14%)
Py SeccureSECCURE compatible Elliptic Curve cryptography in Python
Stars: ✭ 90 (-19.64%)
MalwareHashDBMalware hashes for open source projects.
Stars: ✭ 31 (-72.32%)
CudaSHA256Simple tool to calculate sha256 on GPU using Cuda
Stars: ✭ 38 (-66.07%)
CloakifyCloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based Steganography; Evade DLP/MLS Devices, Defeat Data Whitelisting Controls, Social Engineering of Analysts, Evade AV Detection
Stars: ✭ 1,136 (+914.29%)
Procedural-GenerationAn Overview of Procedural Generation Techniques and Applications
Stars: ✭ 23 (-79.46%)
PysyftA library for answering questions using data you cannot see
Stars: ✭ 7,811 (+6874.11%)
xxhash-rustRust implementation of xxhash
Stars: ✭ 56 (-50%)
DesudesutalkSteganography for imageboards
Stars: ✭ 100 (-10.71%)
serverHashtopolis - A Hashcat wrapper for distributed hashcracking
Stars: ✭ 954 (+751.79%)
EnigmaEnigma cipher tool
Stars: ✭ 13 (-88.39%)
agent-pythonOfficial python agent for using the distributed hashcracker Hashtopolis
Stars: ✭ 39 (-65.18%)
Seal DemoDemos, Examples, Tutorials for using Microsoft SEAL library.
Stars: ✭ 63 (-43.75%)
node-object-hashNode.js object hash library with properties/arrays sorting to provide constant hashes. It also provides a method that returns sorted object strings that can be used for object comparison without hashes.
Stars: ✭ 69 (-38.39%)
Parallel HashmapA family of header-only, very fast and memory-friendly hashmap and btree containers.
Stars: ✭ 858 (+666.07%)
password-dartA set of high-level APIs over PointyCastle and CryptoUtils to hash and verify passwords securely.
Stars: ✭ 40 (-64.29%)
Paramikojsport of the paramiko library from python->javascript
Stars: ✭ 89 (-20.54%)
idy👓 An ID obfuscator for ActiveRecord
Stars: ✭ 15 (-86.61%)
Hash mapNicer way to map your hashes
Stars: ✭ 8 (-92.86%)
Fhe Toolkit LinuxIBM Fully Homomorphic Encryption Toolkit For Linux. This toolkit is a Linux based Docker container that demonstrates computing on encrypted data without decrypting it! The toolkit ships with two demos including a fully encrypted Machine Learning inference with a Neural Network and a Privacy-Preserving key-value search.
Stars: ✭ 1,123 (+902.68%)
ntHashFast hash function for DNA sequences
Stars: ✭ 66 (-41.07%)
IpchainIPChain Core Wallet
Stars: ✭ 26 (-76.79%)
awesome-identiconsA curated list of "Visual Hashs" (Identicon, Avatar, Fractal, RandomArt and general Hash Visualization)
Stars: ✭ 156 (+39.29%)
HaliteHigh-level cryptography interface powered by libsodium
Stars: ✭ 933 (+733.04%)
lthashA homomorphic hash function
Stars: ✭ 61 (-45.54%)
Dfw1n OsintAustralian Open Source Intelligence Gathering Resources, Australias Largest Open Source Intelligence Repository for Cyber Professionals and Ethical Hackers
Stars: ✭ 63 (-43.75%)
komihashVery fast, high-quality hash function (non-cryptographic, C) + PRNG
Stars: ✭ 68 (-39.29%)
StreebogGOST R 34.11-2012: RFC-6986 cryptographic hash function
Stars: ✭ 24 (-78.57%)
JSumConsistent checksum calculation of JSON objects.
Stars: ✭ 64 (-42.86%)
LexiconA data package containing lexicons and dictionaries for text analysis
Stars: ✭ 87 (-22.32%)
ElleThe Elle coroutine-based asynchronous C++ development framework.
Stars: ✭ 459 (+309.82%)
SparseppA fast, memory efficient hash map for C++
Stars: ✭ 1,021 (+811.61%)
BulletproofsBulletproofs are short non-interactive zero-knowledge proofs that require no trusted setup
Stars: ✭ 458 (+308.93%)
Devdatatool编码转换、摘要(hash)、加解密(MD5、SHA1、SHA256、SHA3、SM3、HMAC、DES、3DES、AES、SM4)
Stars: ✭ 446 (+298.21%)
Fernet Java8Java 8 implementation of the Fernet Specification
Stars: ✭ 24 (-78.57%)
StreamcryptorStream encryption & decryption with libsodium and protobuf
Stars: ✭ 112 (+0%)
SputterEthereum Virtual Machine (EVM) implementation
Stars: ✭ 111 (-0.89%)
Stata GtoolsFaster implementation of Stata's collapse, reshape, xtile, egen, isid, and more using C plugins
Stars: ✭ 108 (-3.57%)