Constant-time JavaScript functions
-
Updated
Oct 2, 2022 - TypeScript
Constant-time JavaScript functions
🔐 Key-based encryption and decryption for secure data handling
EntropyString for Elixir
A tool to generate and manage cryptographic keys using a Luna HSM
A Hill Cipher Cracker that performs automated crib dragging given a known plaintext and a ciphertext.
Verify digital signatures using a trusted list of public keys.
This repository contains implementations of various cryptographic algorithms in Java, including AES, DES, RSA, SHA, Triple DES, IDEA, ECC, SHA-256, and MD5. Each algorithm is implemented in a clear and concise manner, providing a practical resource for learning and applying cryptographic techniques in Java.
A command line tool for generating RSA keys
Blackstone — фортификационный крипто-движок на C с AES-256-GCM, ChaCha20-Poly1305 и военной стойкостью для банковских транзакций.
One day, while exploring cryptography, I decided to create what is known as a “perfect cipher”—one that would be completely impervious to any form of cryptanalysis or other cracking methods. That’s how the “13-BILLION-CIPHER” came to be.
certberus CA manager + cert manager
A simple crypto util in Java.
SE_Sketch (Searchable Encryption Sketch) represents a tentative for implementing a searchable encryption scheme.
Simple online cryptography app.
🔐 Encrypt and decrypt data using the Hill Cipher algorithm with Python tools for matrix operations and secure message handling.
Add a description, image, and links to the cryptography-utilities topic page so that developers can more easily learn about it.
To associate your repository with the cryptography-utilities topic, visit your repo's landing page and select "manage topics."