Java implementation of Keccak and SHA-3 hash functions.
☆14Aug 19, 2022Updated 3 years ago
Alternatives and similar repositories for Cryptography
Users that are interested in Cryptography are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Java implementation of FIPS 202, SHA3-xxxx, SHAKE128, SHAKE256☆20Oct 13, 2020Updated 5 years ago
- Optimized (fast) Java Keccak/SHA3/SHAKED implementation☆14Oct 12, 2020Updated 5 years ago
- Implementation of the single-step key derivation function (KDF) as described in NIST Special Publication 800-56C Rev1 supporting messages…☆10Mar 12, 2023Updated 3 years ago
- PDF, CDF, and percent-point/quantile functions for the normal and Student’s t distributions☆12Apr 7, 2026Updated 3 weeks ago
- Implementation of Kravatte Encryption Suite☆15Dec 2, 2018Updated 7 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Java implementation of the authenticated encryption algorithm Ascon☆17Oct 24, 2023Updated 2 years ago
- Chacha20Poly1305 AEAD☆17Mar 15, 2015Updated 11 years ago
- Xoocycle, a C90 implementation of the Xoodyak hash and AEAD construction☆10Mar 28, 2019Updated 7 years ago
- A C implementation of Spritz, a spongy RC4-like stream cipher and hash function.☆28Jan 1, 2026Updated 4 months ago
- A Java library for working with Ascii85, also called Base85 - a form of binary-to-text encoding☆18Oct 13, 2020Updated 5 years ago
- Fixes the recent exploit of CustomPayload packet that causes server to crash☆13Mar 6, 2018Updated 8 years ago
- Collection of sponge functions written in pure Rust☆52Apr 22, 2026Updated last week
- A Spigot/Bukkit Plugin that preforms different item modifications with easy to use commands.☆14Jul 25, 2025Updated 9 months ago
- Hashing application☆13Aug 12, 2020Updated 5 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Cross platform password manager.☆17Jul 21, 2023Updated 2 years ago
- Readable Implementation of Strobe in Go☆26Jan 3, 2022Updated 4 years ago
- encrypts your minecraft chat messages so nobody but you and your friends can see what you're saying. it's kind of a joke don't take it to…☆18Aug 21, 2018Updated 7 years ago
- KeePass Salsa20 Cipher Plugin☆24Apr 13, 2016Updated 10 years ago
- Chacha20 in Javascript☆24Apr 15, 2021Updated 5 years ago
- Many best in class pseudo random generators grouped into one simple library.☆16Jan 1, 2026Updated 4 months ago
- A Python implementation of the Double Ratchet algorithm.☆17Jan 29, 2026Updated 3 months ago
- A blake2s java implementation☆18Jan 31, 2016Updated 10 years ago
- NIST Lightweight Cryptography Primitives☆55Jun 10, 2022Updated 3 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- A statistic driven minecraft killaura detection KI☆10Mar 23, 2017Updated 9 years ago
- HMAC-based Extract-and-Expand Key Derivation Function (HKDF) implemented in Python.☆22Jan 17, 2024Updated 2 years ago
- Enhanced tools to edit existing Bukkit signs. This is a fork of Omel's SignEdit with improved functionality.☆22Jan 15, 2026Updated 3 months ago
- AES-GEM (AES Galois Extended Mode) implementation.☆13Feb 9, 2026Updated 2 months ago
- The Luhn algorithm is a simple checksum formula used to validate a variety of identification numbers, such as credit card numbers, IMEI n…☆10Dec 4, 2017Updated 8 years ago
- Optimized assembly implementations of crypto for the RV32I (RISC-V) architecture☆32Oct 14, 2020Updated 5 years ago
- Visual Hash for matching copies of visually similar images.☆16Mar 17, 2025Updated last year
- The MinecraftID authentication Minecraft server☆12Jun 27, 2022Updated 3 years ago
- An implementation of the ROCCA-S encryption scheme.☆20Mar 13, 2026Updated last month
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Adds support for Holograms, BossBar, Brewing stands, Enchantment tables for legacy versions☆11Apr 29, 2022Updated 4 years ago
- A standalone Java 7 implementation of HMAC-based key derivation function (HKDF) defined in RFC 5869 first described by Hugo Krawczyk. HKD…☆70Feb 12, 2024Updated 2 years ago
- Klefki is a playground for researching elliptic curve group based algorithm, such as MPC, ZKP and HE. All data types & structures are bas…☆24Mar 17, 2026Updated last month
- My best Java class to compress any String, short or long, with any character of human history☆12Feb 16, 2026Updated 2 months ago
- An experiment in fingerprint-free encrypted messaging☆34Jun 1, 2015Updated 10 years ago
- The advanced NoCheatPlus patchwork☆11Nov 7, 2016Updated 9 years ago
- Web UI to check if a Spigot user bought one or more plugins☆10Dec 16, 2022Updated 3 years ago