tahoe-lafs / pycryptoppView external linksLinks
Python bindings to the Crypto++ library
☆50Jul 29, 2023Updated 2 years ago
Alternatives and similar repositories for pycryptopp
Users that are interested in pycryptopp are comparing it to the libraries listed below
Sorting:
- Go support for parsing, compiling, and installing Chromium OS Seccomp-BPF policy files.☆12Mar 21, 2016Updated 9 years ago
- Coins: Research on Bitcoin Scalability and Usability☆12Jul 21, 2023Updated 2 years ago
- Parses https://eprint.iacr.org/eprint-bin/search.pl?last=365&title=1 and sends you an email with the latest papers☆15Nov 11, 2020Updated 5 years ago
- Attacks on Jarvis and Friday☆10Oct 9, 2019Updated 6 years ago
- A pure rust implementation of the gimli cipher☆13Jan 26, 2022Updated 4 years ago
- A standalone AES-KW (AES Key Wrap) implementation.☆14Dec 31, 2023Updated 2 years ago
- An implementation of the LowMC block cipher family.☆27Nov 29, 2017Updated 8 years ago
- ☆12Jul 18, 2022Updated 3 years ago
- One-pass MAC spoofer for multiple devices (based on libmacouflage).☆16Jun 12, 2017Updated 8 years ago
- NIST Lightweight Cryptography Primitives☆54Jun 10, 2022Updated 3 years ago
- A lecture on quantum computing and symmetric-key cryptography at Chinese Academy of Sciences☆15Nov 19, 2020Updated 5 years ago
- Sharing scientific papers using ipfs☆14May 1, 2025Updated 9 months ago
- An AES-based 384 bit permutation.☆21May 3, 2025Updated 9 months ago
- Implementation of Kravatte Encryption Suite☆15Dec 2, 2018Updated 7 years ago
- ☆22Jan 21, 2019Updated 7 years ago
- ☆18Nov 29, 2018Updated 7 years ago
- ☆25Feb 23, 2021Updated 4 years ago
- Software optimized implementations of GIFT and GIFT-COFB☆18Mar 29, 2022Updated 3 years ago
- ☆22Sep 6, 2016Updated 9 years ago
- Implementations of some lightweight block ciphers in C☆19Mar 25, 2018Updated 7 years ago
- ☆20Dec 13, 2019Updated 6 years ago
- Experimental python optimistic rollup fraud-proof generation☆29Aug 30, 2022Updated 3 years ago
- Yet Another Toolkit for Analysis of ARX Cryptographic Algorithms☆32Jan 17, 2022Updated 4 years ago
- Sample implementations of the attacks shown in https://eprint.iacr.org/2020/1456☆21Dec 2, 2021Updated 4 years ago
- Applying MILP Method to Searching Integral Distinguishers Based on Division Property for 6 Lightweight Block Ciphers☆24Dec 13, 2016Updated 9 years ago
- [ARCHIVED] For questions on how to get IPFS up and running smoothly☆22Apr 28, 2020Updated 5 years ago
- Tor Control Port Filter and State Tracker Daemon☆27Nov 19, 2017Updated 8 years ago
- Source code developed in the BLOC project☆20Apr 19, 2019Updated 6 years ago
- IP Puller, IP Sniffer and IP grabber for PS4 and Xbox☆13Jan 7, 2021Updated 5 years ago
- Implementation of the Paillier homomorphic cryptosystem using GMP☆29May 18, 2022Updated 3 years ago
- Node for Decentraland Stone Age☆22Jun 5, 2015Updated 10 years ago
- Deterministic/nonce-reuse resistant authenticated encryption scheme using XChaCha20, implemented on libsodium.☆30Aug 5, 2024Updated last year
- USB key cleaner☆62Oct 26, 2017Updated 8 years ago
- Implementation and simulations for the "Reducing Metadata Leakage from Encrypted Data and Communication with PURBs" paper☆31Oct 26, 2023Updated 2 years ago
- Xoodyak, a lightweight and versatile cryptographic scheme implemented in Rust.☆30Apr 24, 2025Updated 9 months ago
- Tools to optimize small functions, such as S-boxes, for several criteria using SAT solvers☆27Jul 13, 2017Updated 8 years ago
- C implementation of Elligator 2 for Curve25519☆30Jun 26, 2021Updated 4 years ago
- A list of VHDL codes implementing cryptographic algorithms☆27Nov 29, 2021Updated 4 years ago
- An implementation of publicly verifiable proofs of retrievability☆32Feb 24, 2018Updated 7 years ago