zydeon / DSA
Python implementation of the Digital Signature Algorithm
☆21Updated 10 years ago
Alternatives and similar repositories for DSA:
Users that are interested in DSA are comparing it to the libraries listed below
- How to deal with Passwords☆49Updated 2 years ago
- Generalized Naive Bayes Text Classifier written in Java.☆7Updated 8 years ago
- An LD_PRELOAD hack to patch code in memory at program load.☆8Updated 12 years ago
- This python program Encrypts everything with AES 256 bit algorithm.☆23Updated 7 years ago
- Sunmoon 2019 OpenSource Community Group☆1Updated 6 years ago
- SHA256 implementated in Java☆11Updated 10 years ago
- A Firefox Extension to add CORS headers to responses.☆28Updated 12 years ago
- Imitating all commands in the Mr. Robot TV Series☆78Updated 9 years ago
- Game engine developed in android to facilitate creation of visual novels☆9Updated 7 years ago
- A password generator.☆81Updated 3 years ago
- Deeplearning4j Word2Vec Demo☆9Updated 8 years ago
- Simple solutions for simple problems (or not).☆2Updated 6 years ago
- Hide information content into busy areas of images, optimally☆63Updated 8 years ago
- A program to cross a set of genes using Mendel's law and display the change in phenotypic traits throughout the generations.☆3Updated 5 years ago
- ☆8Updated 6 years ago
- A basic 2 player android game.☆7Updated 8 years ago
- Files for social graphs☆13Updated last year
- Post-quantum Cryptography LWE (Learning with Errors) Library☆55Updated last year
- ☆3Updated 8 years ago
- ☆4Updated 6 years ago
- grabbing data through database using phpmysql and JSON☆6Updated 10 years ago
- This is a demo app of Firebase Realtime Database☆7Updated 8 years ago
- ☆12Updated 8 years ago
- One often has so many movies on his hard drive that he/she is unable to choose which one to watch, this app scans through the movies and …☆34Updated 7 years ago
- ☆13Updated 7 years ago
- Cracking 2DES using a meet-in-the-middle attack implemented in python 3.☆15Updated 9 years ago
- Application for cracking Red Petya key based on genetic algorithms.☆53Updated 2 years ago
- Simple bruteforcer for EDA2/HiddenTear based ransomware.☆26Updated 8 years ago
- • Implemented Email Filtering and filtered text into various categories like Spam, Social, Promotions etc using Naïve Bayes Text Classifi…☆7Updated 7 years ago
- Demo app of the Google Cloud Speech API and the Cloud Natural Language API☆6Updated 8 years ago