Java implementation of the authenticated encryption algorithm Ascon
☆17Oct 24, 2023Updated 2 years ago
Alternatives and similar repositories for javaascon
Users that are interested in javaascon are comparing it to the libraries listed below
Sorting:
- deprecated. new repo: https://github.com/ascon/ascon-c☆11Dec 22, 2020Updated 5 years ago
- Tool to automatically search for linear characteristics☆39Jan 27, 2016Updated 10 years ago
- FutureTrust analyzes electronic identification (eID) services in Europe and beyond. It is funded within the EU Framework Programme for Re…☆12Nov 16, 2022Updated 3 years ago
- Implementation of the single-step key derivation function (KDF) as described in NIST Special Publication 800-56C Rev1 supporting messages…☆10Mar 12, 2023Updated 2 years ago
- A flyer we provide to every visitor of the Grazer Linuxtage☆13Nov 28, 2021Updated 4 years ago
- Java implementation of Keccak and SHA-3 hash functions.☆14Aug 19, 2022Updated 3 years ago
- Ascon family of lightweight authenticated encryption and hashing schemes, made developer-friendly and with Init-Update-Final paradigms☆16May 11, 2022Updated 3 years ago
- Suite of symmetric cryptography primitives built on top of the ASCON permutation☆46Nov 18, 2024Updated last year
- ☆83Nov 18, 2025Updated 3 months ago
- Ascon - Lightweight Authenticated Encryption & Hashing☆272Jan 28, 2026Updated last month
- Step-by-step guide on how to use PhotoSwipe in Angular 4+ project☆13Sep 12, 2017Updated 8 years ago
- Java implementation of Verifiable Credentials☆37Feb 20, 2026Updated last week
- A campaign for a modern copyright reform.☆10Dec 11, 2020Updated 5 years ago
- A dead simple library to simulate Minecraft biomes in pure Java☆10Jun 15, 2023Updated 2 years ago
- A suite of dynamic and efficient tools designed for Angular 17+, enhancing application interactivity and aesthetics through innovative op…☆13Jun 19, 2024Updated last year
- My best Java class to compress any String, short or long, with any character of human history☆12Feb 16, 2026Updated last week
- Honeyswap Default Token List 🍯☆10May 4, 2024Updated last year
- Web application for sharing events☆10May 8, 2019Updated 6 years ago
- Specification for a query language to request Verifiable Presentations from wallets etc.☆10Jan 13, 2026Updated last month
- Sphincs+ implementation which uses minimal RAM☆13Aug 31, 2023Updated 2 years ago
- CMSC389R course at UMD☆11Oct 2, 2019Updated 6 years ago
- Gnosis Chain Validator Deposit Tool☆12Feb 11, 2026Updated 2 weeks ago
- The Tragedy of the CO₂mmons☆10Feb 7, 2020Updated 6 years ago
- Various improvements to voice chat groups.☆13Dec 10, 2025Updated 2 months ago
- Installation program to add Jacksum (CLI) and HashGarten (GUI) to Microsoft Windows. It also adds functions to the Send To menu which is …☆12Dec 1, 2024Updated last year
- An Implementation of the MLS (Messaging Layer Security) Standard (RFC 9420) in Kotlin☆12Mar 15, 2024Updated last year
- The classic casino game now in Minecraft, no need for texture packs.☆11Jan 25, 2026Updated last month
- Format-Preserving-Encryption for .NET☆13Dec 12, 2024Updated last year
- ☆14Sep 29, 2025Updated 5 months ago
- Create one timeline from various digital sources☆13Feb 10, 2026Updated 2 weeks ago
- ☆10Apr 5, 2019Updated 6 years ago
- Password management and cracking training☆13Jul 15, 2025Updated 7 months ago
- Py-SSA-Lib: Python implementation of the multichannel singular spectrum analysis (MSSA) and singular spectrum analysis (SSA)☆13Jul 21, 2025Updated 7 months ago
- MPCService allows deploying a multi-party computation service.☆13Dec 13, 2022Updated 3 years ago
- ☆11Jan 10, 2024Updated 2 years ago
- Spring AI for Baidu Qianfan☆15Jun 6, 2025Updated 8 months ago
- An idiomatic C++ wrapper for the Monocypher crypto library☆12Oct 6, 2024Updated last year
- DMs a preloaded burner wallet via link triggered from DM or tweet☆14May 1, 2019Updated 6 years ago
- T&C and Privacy Policy for our website: https://radicallyopensecurity.com/☆17Dec 9, 2024Updated last year