95 results for “topic:cryptographic-algorithms”
Guidance on implementing cryptography as a developer.
Industry Working Group on Automated Cryptographic Algorithm Validation
The Double Ratchet Algorithm implementation in Go
Scripts that illustrate basic cryptography concepts based on Coursera Standford Cryptography I course and more.
Classical ciphers: Caesar, ADFGX, ROT13 and etc.
Python library of efficient and numerically-precise randomness extractors
A list of VHDL codes implementing cryptographic algorithms
JSON Object Signing and Encryption for Node.js and the browser
A CrossLanguage Encryption Module to encrypt data/files (Asymmetric and Symmetric encryption handled)
A crossplatform Secret sharing Tool using python3 . Can be used as offline Password Backup System.
We implement Delegatable Anonymous Credentials using Mercurial Signatures
Symmetric-key Hidden Vector Encryption Scheme
ADAM is an actively developed CSPRNG inspired by ISAAC64
A lightweight library for secure multi-party computation (MPC) based on the GMW protocol, fully written in C#.
The source codes of the SWAN cipher
C++ implementation of cryptographic algorithms such as AES, DES, RSA, DSA, ECC (elliptic curve), MD5, Diffie_Hellman, ElGamal, Caesar cipher, and shift cipher. AES、DES、RSA、DSA、ECC(椭圆曲线)、MD5、Diffie_Hellman、ElGamal、凯撒密码、移位密码等密码学算法的C++实现。
Cryptography-related data repository with Python wrapper (read-only clone of the original GitLab project)
Implementation of Oblivious Dynamic Searchable Encryption Framework
Post-quantum cryptographic implementation of HQC (Hamming Quasi-Cyclic) - a NIST PQC candidate for quantum-resistant key encapsulation using code-based cryptography
Python Library for Elliptic Curve Cryptography: key exchanges (Diffie-Hellman, Massey-Omura), ECDSA signatures, and Koblitz encoding. Suitable for crypto education and secure systems.
The Double Ratchet Algorithm implementation in Go
Stupid Algorithm for Password Hashing (WebCrypto)
Laboratory work on cryptographic methods of information protection 👨💻
Crypto Js secure, dynamic password creator application that uses cryptographic algorithms with Node.js, Express 4, and Heroku cloud deployment.
Oblivious transfer (OT) communications protocol message/response functionality implementations based on Curve25519 and the Ristretto group.
Pure python3 implementation of cryptograhic alogrithms
ParallelCryptography harnesses high-performance computing to optimize cryptographic algorithms. Explore our subprojects for parallel encryption, decryption, hashing, and more. Secure your data efficiently with the power of parallel computing.
This project is an exploration into quantum mechanics and quantum cryptography. Understanding the principles and applicaitons of quantum technologies before exploring quantum algorithms for cryptography and their impact on this field. The project includes both explanations and code for learning about the field.
GEND.AR: Privacy-Preserving Gender-Inclusive Matching in Extended Reality for Spontaneous In-Person Encounters Using Secure Two Party Computation
Oblivious pseudo-random function (OPRF) protocol functionality implementations based on Curve25519 primitives, including both pure-Python and libsodium-based variants.