Java implementation of Keccak and SHA-3 hash functions.
☆14Aug 19, 2022Updated 3 years ago
Alternatives and similar repositories for Cryptography
Users that are interested in Cryptography are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Java implementation of FIPS 202, SHA3-xxxx, SHAKE128, SHAKE256☆20Oct 13, 2020Updated 5 years ago
- Optimized (fast) Java Keccak/SHA3/SHAKED implementation☆14Oct 12, 2020Updated 5 years ago
- Implementation of the single-step key derivation function (KDF) as described in NIST Special Publication 800-56C Rev1 supporting messages…☆10Mar 12, 2023Updated 3 years ago
- PDF, CDF, and percent-point/quantile functions for the normal and Student’s t distributions☆12Updated this week
- Implementation of Kravatte Encryption Suite☆15Dec 2, 2018Updated 7 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Java implementation of the authenticated encryption algorithm Ascon☆17Oct 24, 2023Updated 2 years ago
- A cryptographically secure pseudorandom number generator cli tool printing in a wide variety of byte encodings (hex, base64,..) and for m…☆14Sep 25, 2023Updated 2 years ago
- Xoocycle, a C90 implementation of the Xoodyak hash and AEAD construction☆10Mar 28, 2019Updated 7 years ago
- A C implementation of Spritz, a spongy RC4-like stream cipher and hash function.☆28Jan 1, 2026Updated 3 months ago
- A Java library for working with Ascii85, also called Base85 - a form of binary-to-text encoding☆18Oct 13, 2020Updated 5 years ago
- Fixes the recent exploit of CustomPayload packet that causes server to crash☆13Mar 6, 2018Updated 8 years ago
- Collection of sponge functions written in pure Rust☆52Mar 16, 2026Updated 3 weeks ago
- A Spigot/Bukkit Plugin that preforms different item modifications with easy to use commands.☆14Jul 25, 2025Updated 8 months ago
- A SPAM message filter using a naive Bayes classifier written in Java.☆16Feb 7, 2011Updated 15 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Hashing application☆13Aug 12, 2020Updated 5 years ago
- ☆38Dec 16, 2021Updated 4 years ago
- Readable Implementation of Strobe in Go☆26Jan 3, 2022Updated 4 years ago
- Py-SSA-Lib: Python implementation of the multichannel singular spectrum analysis (MSSA) and singular spectrum analysis (SSA)☆13Jul 21, 2025Updated 8 months ago
- encrypts your minecraft chat messages so nobody but you and your friends can see what you're saying. it's kind of a joke don't take it to…☆18Aug 21, 2018Updated 7 years ago
- KeePass Salsa20 Cipher Plugin☆24Apr 13, 2016Updated 9 years ago
- Chacha20 in Javascript☆24Apr 15, 2021Updated 4 years ago
- Many best in class pseudo random generators grouped into one simple library.☆16Jan 1, 2026Updated 3 months ago
- SHA-3 (Keccak) implementation in Java.☆57Mar 28, 2020Updated 6 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Code for Mateen: Adaptive Ensemble Learning for Network Anomaly Detection☆18Feb 27, 2025Updated last year
- A Python implementation of the Double Ratchet algorithm.☆17Jan 29, 2026Updated 2 months ago
- A blake2s java implementation☆19Jan 31, 2016Updated 10 years ago
- Common sub-modules and procedures in lattice-based constructions☆27Jan 20, 2026Updated 2 months ago
- A statistic driven minecraft killaura detection KI☆10Mar 23, 2017Updated 9 years ago
- HMAC-based Extract-and-Expand Key Derivation Function (HKDF) implemented in Python.☆22Jan 17, 2024Updated 2 years ago
- Algorithms written in Python and Explained using Jupyter 📓 from the Cryptography 🔐 Book ~Forouzan.☆18Feb 20, 2022Updated 4 years ago
- Enhanced tools to edit existing Bukkit signs. This is a fork of Omel's SignEdit with improved functionality.☆23Jan 15, 2026Updated 2 months ago
- Simple anti-tamper embedded into a simple string encryption.☆10Mar 7, 2019Updated 7 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Implementing the blind RSA scheme in Java☆14Nov 2, 2025Updated 5 months ago
- Simultaneously the simplest and most powerful Argon2 implemenation in Python☆21May 15, 2025Updated 10 months ago
- AES-GEM (AES Galois Extended Mode) implementation.☆13Feb 9, 2026Updated 2 months ago
- The Luhn algorithm is a simple checksum formula used to validate a variety of identification numbers, such as credit card numbers, IMEI n…☆10Dec 4, 2017Updated 8 years ago
- Optimized assembly implementations of crypto for the RV32I (RISC-V) architecture☆32Oct 14, 2020Updated 5 years ago
- Visual Hash for matching copies of visually similar images.☆16Mar 17, 2025Updated last year
- The MinecraftID authentication Minecraft server☆12Jun 27, 2022Updated 3 years ago