HMAC-based Extract-and-Expand Key Derivation Function (HKDF) implemented in Python.
☆22Jan 17, 2024Updated 2 years ago
Alternatives and similar repositories for python-hkdf
Users that are interested in python-hkdf are comparing it to the libraries listed below
Sorting:
- Programming with LVars, by example☆36Jul 20, 2015Updated 10 years ago
- Implementation of the single-step key derivation function (KDF) as described in NIST Special Publication 800-56C Rev1 supporting messages…☆10Mar 12, 2023Updated 3 years ago
- A paper computer for Shamir's Secret Sharing over the Bech32 alphabet.☆11Dec 9, 2024Updated last year
- Hashing application☆13Aug 12, 2020Updated 5 years ago
- ☆15Aug 27, 2025Updated 6 months ago
- Haskell library for working with TypeScript Definition files☆18Nov 27, 2017Updated 8 years ago
- Many best in class pseudo random generators grouped into one simple library.☆16Jan 1, 2026Updated 2 months ago
- Dump funding wallet private keys from your clightning node☆19Aug 2, 2023Updated 2 years ago
- Java implementation of the authenticated encryption algorithm Ascon☆17Oct 24, 2023Updated 2 years ago
- Common sub-modules and procedures in lattice-based constructions☆25Jan 20, 2026Updated last month
- Templates for Miniscript-based spending policies. For use by Bitcoin wallet developers and users.☆19Jul 8, 2024Updated last year
- Bitcoin DSL for scripting layer two contracts and interactions with bitcoin nodes☆20Aug 22, 2024Updated last year
- Java implementation of Keccak and SHA-3 hash functions.☆14Aug 19, 2022Updated 3 years ago
- A magical neovim plugin for Bitcoin Script 🪄☆24Dec 1, 2024Updated last year
- 炫彩界面库源码 v1.5.1☆11Nov 20, 2023Updated 2 years ago
- Java implementation of FIPS 202, SHA3-xxxx, SHAKE128, SHAKE256☆20Oct 13, 2020Updated 5 years ago
- Effectful bindings for SQLite (forked from IdrisWeb)☆41May 1, 2018Updated 7 years ago
- Algorithms written in Python and Explained using Jupyter 📓 from the Cryptography 🔐 Book ~Forouzan.☆18Feb 20, 2022Updated 4 years ago
- ☆23Feb 24, 2023Updated 3 years ago
- ☆24Nov 13, 2025Updated 4 months ago
- ☆18Jan 20, 2016Updated 10 years ago
- Implementing the blind RSA scheme in Java☆14Nov 2, 2025Updated 4 months ago
- Dll hijack -- just one macro☆13Jul 3, 2023Updated 2 years ago
- Simultaneously the simplest and most powerful Argon2 implemenation in Python☆21May 15, 2025Updated 10 months ago
- Diameter TCP to SCTP proxy☆13Feb 4, 2012Updated 14 years ago
- Educational materials related to the STAMP safety analysis framework.☆22Mar 26, 2019Updated 6 years ago
- BigInteger for scala with very fast modPow☆10Mar 10, 2026Updated last week
- Memory Pool in different implemention ways, adapt different projects to improve performance☆25Feb 11, 2012Updated 14 years ago
- Frida depends on the excellent Capstone disassembly framework☆19Feb 6, 2026Updated last month
- ☆15Jul 8, 2021Updated 4 years ago
- The actual injected payload of Fripack.☆27Updated this week
- 白盒CLEFIA加密算法☆14Mar 30, 2016Updated 9 years ago
- Klefki is a playground for researching elliptic curve group based algorithm, such as MPC, ZKP and HE. All data types & structures are bas…☆24Updated this week
- Python library of efficient and numerically-precise randomness extractors☆33Jul 28, 2025Updated 7 months ago
- Library of ML-based attribution methods for ICS anomaly detection. From the NDSS 2024 paper: "Attributions for ML-based ICS anomaly detec…☆20Aug 31, 2023Updated 2 years ago
- Windows IOCP library for Rust☆14Aug 26, 2015Updated 10 years ago
- Push notification service☆13Aug 28, 2017Updated 8 years ago
- the kitsunet js implementation☆18Dec 9, 2022Updated 3 years ago
- Crypto projects in python, e.g. Attacks to Vigenere, RSA, Telnet Protocol, Hip Replacement , Vernam cipher, Crack Zip Files, Encryptions…☆20Mar 6, 2023Updated 3 years ago