kocakosm / pitayaLinks
A simple general-purpose utility library for Java 6+
☆36Updated 5 years ago
Alternatives and similar repositories for pitaya
Users that are interested in pitaya are comparing it to the libraries listed below
Sorting:
- Java implementation of FIPS 202, SHA3-xxxx, SHAKE128, SHAKE256☆20Updated 5 years ago
- Java implementation of scrypt☆433Updated 5 years ago
- ☆220Updated 8 years ago
- TweetNaCl in Java - a port of TweetNaCl-js☆49Updated 2 years ago
- Pure Java implementation of EdDSA☆231Updated 2 years ago
- SHA-3 (Keccak) implementation in Java.☆57Updated 5 years ago
- Simple Java interface to handle Bitcoin transactions☆12Updated 12 years ago
- Plain Java implementation of the Noise protocol☆142Updated last year
- A Java implementation of the Libsodium crypto library. For the lazy dev.☆149Updated 7 months ago
- Turn's BitTorrent Java library (tracker and client)☆41Updated 7 years ago
- Quick-n-dirty standalone Java implementation of ChaCha20 (256-bit key, 64- or 96-bit nonce)☆22Updated 5 years ago
- ☆15Updated 14 years ago
- Pure Java implementation of curve25519, salsa20, hsalsa20, xsalsa20 and poly1305 cryptographic primitives, along with a NaCl "Box" implem…☆112Updated 2 years ago
- T0rlib4j is a Java controller library for Tor☆53Updated 4 years ago
- libsodium-jna is a java library that binds to libsodium C crypto APIs with Java Native Access (JNA)☆54Updated last year
- Java implementation of multiaddr☆16Updated last week
- Java library that maps ports on NAT-enabled routers (supported protocols: UPnP-IGD/NAT-PMP/PCP).☆95Updated last year
- A simple Java implementation of Merkle Trees, with Ant build file and JUnit test classes☆58Updated 5 years ago
- ☆18Updated 3 months ago
- A standalone Java 7 implementation of HMAC-based key derivation function (HKDF) defined in RFC 5869 first described by Hugo Krawczyk. HKD…☆69Updated last year
- Java Client for Twilio Authy Two-Factor Authentication (2FA) API☆69Updated 3 years ago
- Extensible BSON encoder/decoder library written in Java with pluggable Java-to-BSON type mappings.☆64Updated 2 years ago
- ⚠️ OBSOLETE. DO NOT USE! Verifies Maven SHA1 hashes against a known list to deter dependency-chain attack vectors☆24Updated 7 years ago
- Provides a JAR and an AAR for embedding the Tor Onion Proxy into a Java or Android Program☆186Updated last year
- A Java implementation of Multihash☆51Updated this week
- ☆23Updated 4 years ago
- An asymptotically fast version of java.math.BigInteger☆80Updated 4 years ago
- Official BigchainDB Java driver☆32Updated 7 years ago
- Java implementation of the BLAKE2b cryptographic hash function☆81Updated 3 years ago
- Java implementation of ZRTP protocol☆27Updated 9 years ago