crypto-ext is a set of functionality providing easy and intuitive abstractions to encrypt, decrypt, sign and verify your data
-
Updated
Mar 23, 2023 - Rust
Cryptography, or cryptology is the practice and study of techniques for secure communication in the presence of adversarial behavior. More generally, cryptography is about constructing and analyzing protocols that prevent third parties or the public from reading private messages.[
crypto-ext is a set of functionality providing easy and intuitive abstractions to encrypt, decrypt, sign and verify your data
An exploration into the concepts of Cryptography and Cybersecurity
Rust implementation of some cryptogrphic algorithmes
Winternitz Signatures (one-time signatures) implemented in python
A complete desktop cryptosystem based on SHA3 and the E521 elliptic curve for message exchange and authentication
Small program to demonstrate most important cryptography concepts. Written using Node.js Crypto module and TypeScript.
This encryption tool is for encrypting top secret, i.e. secrets of strategic importance to a country ( no objection if you use a cannon to shoot mosquitoes). It is the most powerful and strongest encryption tool in the world. Its strength is 10 to 154th power times that of the mainstream encryption: Aes256.
Rust implementation for Elliptic Curve Cryptography
Cryptography is the practice of securing communication through mathematical techniques, such as encryption, decryption, and key exchange.
Safeguard your passwords effectively with SecurePass, a powerful password manager. Featuring advanced Fernet encryption and a user-friendly interface, SecurePass empowers users to securely store and access their passwords. Built with Python and cryptography, it ensures robust data protection in a user-centered solution.
Length-preserving encryption algorithm https://eprint.iacr.org/2021/1441.pdf
`CryptoAPI` is a Python toolkit for encryption algorithms like Caesar, Playfair, Vigenère, AES, RSA, and SHA. It offers a user-friendly interface to encrypt, decrypt, and generate secure hashes.
a secure, usable and scalable alternative to existing password and federation-based user authentication schemes
A Python π Secure Multi-Party Computation Sandbox with a Joint Signature Scheme using Elliptic Curve Cryptography βοΈ+π+π+π = π
An intro to cryptography and encryption with John The Ripper
Implementation of Elliptic Curve Cryptography algorithm in Java