Explore projects
-
-
Core Nobodies / caesar-cipher
BSD 2-Clause "Simplified" License3 лабораторная работа по ООП. Декодирование шифра
Updated -
Jens Guballa / SubstitutionBreaker
MIT LicenseThis project provides a Python implementation for breaking classical substitution ciphers.
Updated -
Updated
-
-
Twuni / SHA3.js
MIT LicenseA pure JavaScript implementation of the Keccak family of cryptographic hashing algorithms, most notably including Keccak and SHA3.
Updated -
Project for the 'Cryptography and Security Protocols' course.
Updated -
Randy Barlow / yubibomb
GNU General Public License v3.0 onlyDon't you love when you accidentally tap your Yubikey when you have your IRC client in focus and you send 987947 into Freenode? Want to be able to have that experience without having to reach all the way over to your laptop's USB port? Now you can!
Updated -
-
Juan Ruiz Segura / wci
GNU General Public License v3.0 onlyTexts analysis, C program. Create dictionaries from files or inputs. Useful for languages, cryptography, hack, and forensic. Análisis estadistico de textos para estudio criptográfico temático o enseñanza de idiomas, crea diccionario
Updated -
Neat program for encrypting and decrypting messages with changable key.
Updated -
Mark Loveless / Ncrypt
GNU General Public License v2.0 or laterUnix-based command line file encryption tool that uses the three AES candidate algorithms - Rijndael, Serpent, and Twifish.
Updated -
Mark Loveless / NPC
GNU General Public License v2.0 or laterNPC - Nearly Perfect Crypto. Extremely fast and the ultimate crypto program since it uses one time pads. However, key management is a complete bitch.
Updated -
ethereum2-av / walletd
Apache License 2.0Updated -
A mini-script just to get familiar with caesar ciphers.
Updated -
Using the combination of two algorithm to secure a file with format of .PDF , .Txt ,and .Docx
Updated -
Proof-of-concept implementation of a forward-secure 0-RTT key exchange integrated into Google's QUIC transport protocol. It uses puncturable encryption to transfer the keys, achieving forward security, replay resilience and 0-RTT key exchange.
Updated -
-
Rens / EQT
MIT LicenseSecure Equality Testing based on https://dl.acm.org/doi/10.1145/3230833.3230866
Available on pypi
Updated -
Implementing Data Encryption Standard in Python.
Updated