176 results for “topic:asymmetric-cryptography”
Easy to use cryptographic framework for data protection: secure messaging with forward secrecy and secure data storage. Has unified APIs across 14 platforms.
.NET Core Encryption
Software for "Quantum-Resistant Cryptosystems from Supersingular Elliptic Curve Isogenies"
W3C Web Cryptography API for Node.js
Airmed Foundation's IPFS + Hyperledger Fabric web client
A secure chat between an Android client and Java server using AES for encryption and Diffie-Hellman for key exchange.
Complete ASP.NET Core template ready-to-go with: OpenAI, OAuth 2.0, JSON Web Algorithms and Bearer Tokens (JOSE: JWT, JWS, JWE), HMAC symmetric key, RSA X509 certificate asymmetric key, AES encryption, CQRS, DDD, MediatR, Dapper, Docker, Entity Framework, Fluent Validation, GZip, Hangfire, NLog, REST CRUD, Swagger, Scalar...
A simple Dart library for asymmetric encryption and digital signatures
JS bindings and playground of post-quantum asymmetric ciphers
Encryption based on asymmetric cryptography
World's most advanced high school admissions system. Design by Aletheie. Code by EETagent & starvy
AES 256 & RSA encrypted video steganography. SRU Hackathon 2022 - Cybersecurity Winners
In this comprehensive guide, you'll learn how to properly refresh JSON Web Tokens (JWTs) using the RS256 algorithm and Redis. The integration of Redis will give us the ability to effortlessly revoke or invalidate the JWTs when necessary.
Easily generate RSA Public-Private Keypairs and use them for secure asymmetric one-way encryption and decryption! - npmjs.com/package/quick-encrypt
An Advanced PHP Cryptography Framework
Cross-browser cryptographic library implementing the Web Cryptography API.
Encrypted File System simulator.
message signing and verifying for Lightning Network
Python Program to encrypt Strings and Files using End-to-End Asymmetric & Symmetric Encyption
Pollard Rho attack on ECDLP with GMP
A simple Commandline Program Developed Using Python3 to make GNU Privacy Guard Program easy to use for beginners.
A practical implementation of the approach for designing fast public key encryption systems using white-box cryptography techniques
The Cipher Toolkit Built For All Skill Levels
Inspired by Neal Koblitz's article 'Cryptography As a Teaching Tool' this module was programmed following his 'Kid-RSA' example.
JavaScript implementation of the IPFS Mutable File System supporting out of the box crypto operations
a package to encrypt and decrypt data using asymmetric cryptography algorithms
C# console app for rsa encryption on texts larger than the encrypting key size and storing to file for later decryption
Exercises for Cryptography Exam @ Polito - Cryptographic primitives in C with OpenSSL and prototype attacks in Python.
Appunti del corso di Protocolli e Architetture di Rete - Computer Networks' Architectures and Protocols. UniMoRe. 2023-2024.
Net Core Jwt Asymmetric Signing with public private key