DES cracking using brute force algorithm and CUDA
☆25Jun 14, 2017Updated 8 years ago
Alternatives and similar repositories for des-cuda
Users that are interested in des-cuda are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- High Speed elliptic curve signature system using a 260-bit Granger Moss Prime.☆14Jun 3, 2021Updated 4 years ago
- Solution to harden TLS security by storing private keys and delegating operations to the Trused Execution Environment☆13Oct 10, 2022Updated 3 years ago
- Go implementation of bcrypt_pbkdf(3) from OpenBSD☆15Feb 5, 2015Updated 11 years ago
- Wycheproof for Rust☆20Sep 3, 2025Updated 6 months ago
- Faster Montgomery and Joye ladder formulas for short Weierstrass elliptic curves☆22Jul 1, 2020Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Models for authenticated key exchange in Tamarin☆12Oct 9, 2019Updated 6 years ago
- A tool for linear and differential cryptanalysis of block ciphers written in Rust☆15Sep 28, 2022Updated 3 years ago
- Program for finding low gate count implementations of S-boxes.☆41Oct 22, 2024Updated last year
- Identity Based Encryption schemes on the BLS12-381 pairing-friendly elliptic curve☆20Aug 31, 2021Updated 4 years ago
- Proof-of-concept implementation of the (V)OPRF protocol in https://datatracker.ietf.org/doc/draft-irtf-cfrg-voprf/☆22Aug 24, 2020Updated 5 years ago
- Implementation of the BLS12-381 pairing-friendly elliptic curve group with extra features needed by the Dusk-Network team☆23Updated this week
- BLS12-381 cryptography using Apache Milagro☆30Feb 2, 2024Updated 2 years ago
- Schnorr signatures over big curves for Ledger devices. group arithmetic & key derivation for unusual elliptic curves.☆13Apr 9, 2020Updated 5 years ago
- A STARK-friendly elliptic curve designed to work within Cairo circuits☆27Feb 2, 2023Updated 3 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Implementation of the Fish and Begol signature schemes☆14Jul 3, 2017Updated 8 years ago
- Blind RSA signatures for OpenSSL/BoringSSL.☆17Jan 31, 2026Updated last month
- like ChaCha, but 64-bit instead of 32-bit thanks to BLAKE2b's permutation☆16Apr 8, 2017Updated 8 years ago
- Vector Commitments with Constant-Sized, Updatable Proofs and Linear-Sized Public Parameters☆11Jun 3, 2021Updated 4 years ago
- Finite Fields and Curves in Lean☆14Apr 6, 2023Updated 2 years ago
- A privacy-preserving digital version of punch cards used in store loyalty programs☆11Apr 19, 2021Updated 4 years ago
- Crate to generate files in ROFF format (Rust)☆25Nov 8, 2021Updated 4 years ago
- Rust implementation of Zcash multi-signautres☆13Jun 23, 2019Updated 6 years ago
- Banquet implementation☆14May 6, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Results of a recent FOIA for NIST documents related to the design of Dual EC DRBG. Via EFF and Rep. Grayson's office. See README for deta…☆24Feb 10, 2015Updated 11 years ago
- A pure rust implementation of the gimli cipher☆13Jan 26, 2022Updated 4 years ago
- [HISTORICAL] FIPS and higher-level algorithm tests for RISC-V Crypto Extension☆29Jul 23, 2024Updated last year
- Implements the Barreto-Naehrig (BN) curve as used by Ethereum☆12May 31, 2019Updated 6 years ago
- A pure-Rust implementation of the Paillier encryption scheme☆37Dec 26, 2022Updated 3 years ago
- go implementation of anchorhash☆15Nov 19, 2020Updated 5 years ago
- A memory-hard password hashing function.☆71May 29, 2023Updated 2 years ago
- Fujisaki-Suzuki Ring Signatures in Rust☆20Feb 22, 2021Updated 5 years ago
- A new heuristic to optimize implementations of linear matrices☆19Jan 2, 2023Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A standalone AES-KW (AES Key Wrap) implementation.☆14Dec 31, 2023Updated 2 years ago
- Pointcheval Sanders signature☆27Mar 16, 2026Updated 2 weeks ago
- ☆12May 7, 2021Updated 4 years ago
- ☆10Aug 8, 2022Updated 3 years ago
- Summaries of findings from Ampleforth audits☆12Jun 2, 2025Updated 9 months ago
- Provisions: Privacy-preserving proofs of solvency for Bitcoin☆14Jan 10, 2016Updated 10 years ago
- U2f implementation with threshold signatures☆16Nov 24, 2020Updated 5 years ago