Curl CollisionsAn implementation of Heilman et al.'s differential attack on IOTA's Curl hashing function.
Stars: ✭ 20 (-83.87%)
LibblsBLS signatures, threshold encryption, distributed key generation library in modern C++. Actively maintained and used by SKALE for consensus, distributed random number gen, inter-chain communication and protection of transactions. BLS threshold signatures can be verified in Solidity, and used as random beacon (common coin)
Stars: ✭ 74 (-40.32%)
Fake JniAn implementation of the JNI and JVMTI with support for direct interaction between natively registered classes and JVM objects.
Stars: ✭ 20 (-83.87%)
Active enumerableActiveRecord like query methods for Ruby enumerable collections.
Stars: ✭ 73 (-41.13%)
FlickrsyncA command line tool to synchronise, upload, download, pictures between the local file system and Flickr. Image hash signature of the picture is used to uniquely identify the image.
Stars: ✭ 14 (-88.71%)
Pyjksa pure python Java KeyStore file parser, including private key decryption
Stars: ✭ 100 (-19.35%)
Probable WordlistsVersion 2 is live! Wordlists sorted by probability originally created for password generation and testing - make sure your passwords aren't popular!
Stars: ✭ 7,312 (+5796.77%)
HobbyscriptYet Another JVM/LLVM Dynamic Language (LLVM Backend WIP)
Stars: ✭ 72 (-41.94%)
FeatherdusterAn automated, modular cryptanalysis tool; i.e., a Weapon of Math Destruction
Stars: ✭ 876 (+606.45%)
Vrf.jsA pure Javascript Implementation of Verifiable Random Functions
Stars: ✭ 124 (+0%)
Deep MihashCode for papers "Hashing with Mutual Information" (TPAMI 2019) and "Hashing with Binary Matrix Pursuit" (ECCV 2018)
Stars: ✭ 13 (-89.52%)
State Machine🤖 A state machine library for Kotlin, with extensions for Android.
Stars: ✭ 72 (-41.94%)
SootyThe SOC Analysts all-in-one CLI tool to automate and speed up workflow.
Stars: ✭ 867 (+599.19%)
JmacaroonsPure Java implementation of Macaroons: Cookies with Contextual Caveats for Decentralized Authorization in the Cloud. Android ready. Online playground available.
Stars: ✭ 100 (-19.35%)
Metrics Jvm ExtrasA set of additional metrics complementing Dropwizards metrics-jvm.
Stars: ✭ 10 (-91.94%)
Md5 SimdAccelerate aggregated MD5 hashing performance up to 8x for AVX512 and 4x for AVX2. Useful for server applications that need to compute many MD5 sums in parallel.
Stars: ✭ 71 (-42.74%)
AntidebuggingAntiDebugging sample sources written in C++
Stars: ✭ 114 (-8.06%)
Lypaymentfield多种风格的支付框控件,可定制加密图片,也可使用带动画的弹窗。A variety of styles of payment box controls can be customized to encrypt pictures, can also be used with animated alert.
Stars: ✭ 58 (-53.23%)
Cryptonight➿ Pure Go/ASM implementation of CryptoNight hash function with its variants, without any CGO binding.
Stars: ✭ 58 (-53.23%)
Simon Speck Cexample C language implementation of SIMON and SPECK lightweight block ciphers.
Stars: ✭ 9 (-92.74%)
DigestifSimple hash algorithms in OCaml
Stars: ✭ 69 (-44.35%)
LibraryCollection of papers in the field of distributed systems, game theory, cryptography, cryptoeconomics, zero knowledge
Stars: ✭ 100 (-19.35%)
Bestnote👊 持续更新,Java Android 近几年最全面的技术点以及面试题 供自己学习使用
Stars: ✭ 841 (+578.23%)
Go DicewareGolang library for generating passphrases via the diceware algorithm.
Stars: ✭ 69 (-44.35%)
MillYour shiny new Java/Scala build tool!
Stars: ✭ 1,667 (+1244.35%)
Pathwar☠️ The Pathwar Project ☠️
Stars: ✭ 58 (-53.23%)
GojvmJVM implementation by Go
Stars: ✭ 69 (-44.35%)
CryptogotchasA collection of common (interesting) cryptographic mistakes.
Stars: ✭ 118 (-4.84%)
Yubikey Agentyubikey-agent is a seamless ssh-agent for YubiKeys.
Stars: ✭ 1,744 (+1306.45%)
Py SeccureSECCURE compatible Elliptic Curve cryptography in Python
Stars: ✭ 90 (-27.42%)
AesAES-128 hardware implementation
Stars: ✭ 25 (-79.84%)
Blake3BLAKE3 hashing for JavaScript: native Node bindings (where available) and WebAssembly
Stars: ✭ 100 (-19.35%)
StreebogGOST R 34.11-2012: RFC-6986 cryptographic hash function
Stars: ✭ 24 (-80.65%)
BughuntA weekly challenge where we share some code and you find a bug in it.
Stars: ✭ 68 (-45.16%)
Java Competitive ProgrammingI have written some important Algorithms and Data Structures in an efficient way in Java with proper references to time and space complexity. These Pre-cooked and well-tested codes help to implement larger hackathon problems in lesser time. DFS, BFS, LCA, All Pair Shortest Path, Longest Common Subsequence, Binary Search, Lower Bound Search, Maximal Matching, Matrix Exponentiation, Segment Tree, Sparse Table, Merge Sort, Miller Prime Test, Prims - Minimum Spanning Tree, BIT - Binary Index Tree, Two Pointers, BST - Binary Search Tree, Maximum Subarray Sum, Immutable Data Structures, Persistent Data Structurs - Persistent Trie, Dijkstra, Z - Function, Minimum Cost Maximal Matching, Heavy Light Decomposition, Knapsack, Suffix Array and LCP - Longest Common Prefix, Squre Root Decomposition, Kth Order Statics, Trie / Prefix Tree, LIS - Longest Increasing Subsequence, Hashing
Stars: ✭ 24 (-80.65%)
Aeternityæternity: solving scalability problems by making sense of state-channels
Stars: ✭ 923 (+644.35%)
PgenCommand-line passphrase generator
Stars: ✭ 68 (-45.16%)
HbcAPI of homomorphic binary operations such as binary comparisons or binary divisions using the library HElib
Stars: ✭ 23 (-81.45%)
JavascriptA repository for All algorithms implemented in Javascript (for educational purposes only)
Stars: ✭ 16,117 (+12897.58%)
Virgil Crypto PhpVirgil PHP Crypto Library is a high-level cryptographic library that allows you to perform all necessary operations for secure storing and transferring data and everything required to become HIPAA and GDPR compliant.
Stars: ✭ 22 (-82.26%)
Gurvygurvy implements Elliptic Curve Cryptography (+Pairing) for BLS12-381, BLS12-377, BW6-761, and BN256. Originally developed (and used) by gnark
Stars: ✭ 66 (-46.77%)
RecryptTransform encryption library for Scala
Stars: ✭ 22 (-82.26%)
Endesiveen-crypt, de-crypt, si-gn, ve-rify - smime, pdf, xades and plain files in pure python
Stars: ✭ 122 (-1.61%)
Wasm2ktWeb Assembly to Kotlin and Java converter. Allows to compile a C or C++ program/library, and generate a Kotlin or Java program/library.
Stars: ✭ 18 (-85.48%)
Crypto BenchBenchmarks for crypto libraries (in Rust, or with Rust bindings)
Stars: ✭ 67 (-45.97%)
AirassemblyLow-level language for encoding AIR of computations
Stars: ✭ 18 (-85.48%)
HashtopolisA Hashcat wrapper for distributed hashcracking
Stars: ✭ 835 (+573.39%)
Tf EncryptedA Framework for Encrypted Machine Learning in TensorFlow
Stars: ✭ 832 (+570.97%)
StackparamJVM agent to add method parameters to Java stack traces
Stars: ✭ 90 (-27.42%)
IpfsfbInterPlanetary File System for Business (IPFSfB) is an enterprise blockchain storage network based on InterPlanetary File System.
Stars: ✭ 57 (-54.03%)
Ea AsyncEA Async implements async-await methods in the JVM.
Stars: ✭ 1,085 (+775%)
Quitnow CacheA collection to store data for a given time
Stars: ✭ 109 (-12.1%)
String HashGet the hash of a string
Stars: ✭ 56 (-54.84%)
CryptographyCryptography for Flutter developers: encryption, digital signatures, key agreement, etc.
Stars: ✭ 56 (-54.84%)