tahoe-lafs / pycryptoppLinks
Python bindings to the Crypto++ library
☆50Updated last year
Alternatives and similar repositories for pycryptopp
Users that are interested in pycryptopp are comparing it to the libraries listed below
Sorting:
- secure messaging, file-transfer, and directory synchronization☆41Updated 7 years ago
- Non-C Implementations of the yescrypt KDF.☆29Updated 6 years ago
- Reference implementations (software)☆85Updated 8 years ago
- Experiments in high-assurance crypto.☆47Updated 2 years ago
- mirror of djb's "NaCl: Networking and Cryptography library"☆50Updated 14 years ago
- An implementation of the axolotl ratchet based on libsodium.☆23Updated 2 years ago
- mixminion is the main implementation of the Type III ("Mixminion") remailer protocol.☆60Updated 12 years ago
- FLECC_IN_C is a FLexible Elliptic Curve Cryptography library written IN C☆18Updated 7 years ago
- A Shadow plug-in that runs the Bitcoin Satoshi reference software☆25Updated 5 years ago
- Deterministic execution virtual machine sandbox for Moxie arch☆74Updated 5 years ago
- (Deprecated PoC) Innovative censorship evading technology based on p2p distributed caching network☆58Updated 8 years ago
- An hash-chain with efficient O(1) append and O(logN) proof.☆14Updated 7 years ago
- mixminion is the main implementation of the Type III ("Mixminion") remailer protocol.☆88Updated 13 years ago
- Mirror of SUPERCOP, the "System for Unified Performance Evaluation Related to Cryptographic Operations and Primitives"☆99Updated 8 years ago
- A flexible implementation of Colin Percival's scrypt☆91Updated last year
- Mirror of http://sourceforge.net/p/ed448goldilocks/code/ci/master/tree/☆33Updated 10 years ago
- A python implementation of the Axolotl ratchet protocol.☆71Updated 7 years ago
- Pure Python SSL, TLS and DTLS library☆36Updated 7 years ago
- A fast secure userspace pseudorandom number generator☆83Updated 11 years ago
- Privacy-preserving Tor statistics aggregation tool that implements the secret-sharing variant of the PrivEx algorithm.☆26Updated 4 years ago
- Password Hashing Competition Submissions☆72Updated 11 years ago
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆28Updated 7 years ago
- A fork of floodyberry's ed25519-donna modified to support the Ristretto prime-order group☆14Updated 4 years ago
- HILA5 KEM/DEM. Reference and Optimized Implementations + NIST PQC Submission Documents☆16Updated 7 years ago
- A password-based implementation of threshold encryption☆32Updated 12 years ago
- Planning for next generation secure chat.☆37Updated 10 years ago
- A memory-hard password hashing function.☆69Updated 2 years ago
- Sphinx-based Password Storage low-level library☆130Updated 5 months ago
- An Implementation of the Fully Homomorphic Smart-Vercauteren Cryptosystem☆44Updated 9 years ago
- pure-python routines for curve25519/ed25519☆36Updated 5 years ago