Industry Working Group on Automated Cryptographic Algorithm Validation
-
Updated
Jul 2, 2024 - HTML
Industry Working Group on Automated Cryptographic Algorithm Validation
This C# program efficiently calculates "a^b mod n" using fast modular exponentiation algorithm. Ideal for cryptography and large number computations.
A simple generator of bytes lists or arrays in different programming languages.
This project is an exploration into quantum mechanics and quantum cryptography. Understanding the principles and applicaitons of quantum technologies before exploring quantum algorithms for cryptography and their impact on this field. The project includes both explanations and code for learning about the field.
A collection of different cryptographic algorithms and ciphers, including the maths behind each algorithm. This is an ongoing project that will be added to over time, with the aim of providing a comprehensive resource for learning about cryptography. The project includes both the code for the algorithms and explanations of how they work.
RSA implementation in Rust
Python library of efficient and numerically-precise randomness extractors
A simple generator of numbers lists or arrays in different programming languages.
A simple generator of numbers between -7 and 7 as lists or arrays in different programming languages.
A simple generator of reversible bytes lists or arrays in different programming languages for swapping from a byte value to an other.
Cryptography-related data repository with Python wrapper (read-only clone of the original GitLab project)
Python library for Elliptic Curve Cryptography: key exchanges (Diffie-Hellman, Massey-Omura), ECDSA signatures, and Koblitz encoding. Suitable for crypto education and secure systems.
A CrossLanguage Encryption Module to encrypt data/files (Asymmetric and Symmetric encryption handled)
Pure python3 implementation of cryptograhic alogrithms
ADAM is an actively developed CSPRNG inspired by ISAAC64
A very useless hashing algorithm based on MD5 that probably has more hash collisions than MD5
SHA-3 and Keccak checksum utility
Applied Cryptography
A lightweight library for secure multi-party computation (MPC) based on the GMW protocol, fully written in C#.
ParallelCryptography harnesses high-performance computing to optimize cryptographic algorithms. Explore our subprojects for parallel encryption, decryption, hashing, and more. Secure your data efficiently with the power of parallel computing.
Add a description, image, and links to the cryptographic-algorithms topic page so that developers can more easily learn about it.
To associate your repository with the cryptographic-algorithms topic, visit your repo's landing page and select "manage topics."