bwesterb / py-seccureLinks
SECCURE compatible Elliptic Curve cryptography in Python
☆94Updated 5 years ago
Alternatives and similar repositories for py-seccure
Users that are interested in py-seccure are comparing it to the libraries listed below
Sorting:
- Pure-Python implementation of AES block-cipher and common modes of operation.☆469Updated last year
- Python implementation of FIPS SHA3 and SHAKE☆45Updated 7 years ago
- TLS Library in python☆237Updated 3 years ago
- Pure-Python implementation of Scrypt PBKDF and scrypt file format library.☆82Updated 3 years ago
- Elliptic Curve Cryptography playground/toolkit written in pure Python☆69Updated 3 years ago
- wrapper for libsodium providing high level crypto primitives☆133Updated 7 months ago
- PyCryptoPlus: a pycrypto extension written 100% in Python☆76Updated 9 years ago
- A system for securely splitting secrets with Shamir's Secret Sharing Scheme☆512Updated 3 years ago
- Fault attack agaisnt EdDSA demonstrated on an Arduino Nano board, allowing for partial key recovery and fake signatures.☆73Updated 8 years ago
- Pure python, slow and standard implementation of PKCS #1 also knows as RSA☆31Updated 2 years ago
- Python OpenSSL wrapper. For modern cryptography with ECC, AES, HMAC, Blowfish, ...☆132Updated 8 years ago
- pure-python ECDSA signature/verification and ECDH key agreement☆962Updated 3 months ago
- Simple ciphers implementation in Python. AtBash, Bacon, Bifid, Caesar, Polybius.☆20Updated 11 years ago
- A reference implementation of Diffie-Hellman in Python☆64Updated 8 years ago
- Pure Python SSL, TLS and DTLS library☆36Updated 7 years ago
- A python implementation of the block cipher RC4☆41Updated 8 years ago
- Timing Attack on TLS' ECDSA signature☆46Updated 10 years ago
- Python wrapper for the OnionOO tor status API☆32Updated 8 years ago
- Python library for fast elliptic curve crypto☆286Updated last month
- This is a toy implementation in Go of Manger's chosen-ciphertext attack on RSA-OAEP☆31Updated 7 years ago
- cribdrag - an interactive crib dragging tool for cryptanalysis on ciphertext generated with reused or predictable stream cipher keys☆176Updated 5 years ago
- a tool to identify cryptographic hashes, encodings, and other artifacts in a byte stream according to traces of its representation☆135Updated 2 months ago
- Twisted-based asynchronous Tor control protocol implementation. Includes unit-tests, examples, state-tracking code and configuration abst…☆260Updated last month
- Solutions for the Matasano Crypto Challenges☆24Updated 7 years ago
- 👥 A Python post-quantum cryptography library☆65Updated 9 years ago
- A Python / Scapy implementation of the OR (TOR) protocol.☆98Updated 4 years ago
- Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS☆120Updated 8 years ago
- A Python implementation of OpenPGP☆72Updated 4 years ago
- A Python implementation of the authenticated encryption mode Galois/Counter Mode (GCM).☆46Updated 8 years ago
- free crypto audit☆31Updated 8 years ago