Rust implementation of some cryptogrphic algorithmes
-
Updated
Feb 17, 2023 - Rust
Cryptography, or cryptology is the practice and study of techniques for secure communication in the presence of adversarial behavior. More generally, cryptography is about constructing and analyzing protocols that prevent third parties or the public from reading private messages.[
Rust implementation of some cryptogrphic algorithmes
crypto-ext is a set of functionality providing easy and intuitive abstractions to encrypt, decrypt, sign and verify your data
An exploration into the concepts of Cryptography and Cybersecurity
A complete desktop cryptosystem based on SHA3 and the E521 elliptic curve for message exchange and authentication
Winternitz Signatures (one-time signatures) implemented in python
This encryption tool is for encrypting top secret, i.e. secrets of strategic importance to a country ( no objection if you use a cannon to shoot mosquitoes). It is the most powerful and strongest encryption tool in the world. Its strength is 10 to 154th power times that of the mainstream encryption: Aes256.
Rust implementation for Elliptic Curve Cryptography
Cryptography is the practice of securing communication through mathematical techniques, such as encryption, decryption, and key exchange.
Small program to demonstrate most important cryptography concepts. Written using Node.js Crypto module and TypeScript.
Length-preserving encryption algorithm https://eprint.iacr.org/2021/1441.pdf
`CryptoAPI` is a Python toolkit for encryption algorithms like Caesar, Playfair, Vigenère, AES, RSA, and SHA. It offers a user-friendly interface to encrypt, decrypt, and generate secure hashes.
a secure, usable and scalable alternative to existing password and federation-based user authentication schemes
Safeguard your passwords effectively with SecurePass, a powerful password manager. Featuring advanced Fernet encryption and a user-friendly interface, SecurePass empowers users to securely store and access their passwords. Built with Python and cryptography, it ensures robust data protection in a user-centered solution.
Israel X - Unlocking Information Security I: From Cryptography to Buffer Overflows and Unlocking Information Security II: An Internet Perspective
An intro to cryptography and encryption with John The Ripper
A Python π Secure Multi-Party Computation Sandbox with a Joint Signature Scheme using Elliptic Curve Cryptography βοΈ+π+π+π = π