RSS 608 projects tagged "Cryptography"

No download Website Updated 23 Feb 2012 cryptodev-linux

Screenshot
Pop 37.99
Vit 2.36

Cryptodev-linux is a Linux kernel module implementation of the OpenBSD cryptodev userspace API (/dev/crypto). The Linux crypto API is being used as the backend and thus requires no dependencies other than a stock Linux kernel.

No download No website Updated 23 Apr 2010 PyCryptoPlus

Screenshot
Pop 42.38
Vit 38.23

PyCryptoPlus is a cryptographic module similar to PyCrypto, with which it shares the API. But PyCryptoPlus is written 100% in Python, so its primary interest is educational and scientific; if you want real speed, you're better checking out PyCrypto. It was not completely written from scratch, but integrates other cipher codes when available in Python and under appropriate licenses. It contains, among other things: Block cipher algorithms (Serpent, Blowfish, Twofish, DES, 3DES, AES, Rijndael, and PRESENT); modes of operation (CMAC, ECB, CBC, CTR, and XTS); paddings (bit padding, zeros, PKCS7, PKCS12, ISO 10126, and ANSI X.923); and one-way functions (MD5, SHA1/SHA2, Whirlpool, RipeMD, RadioGatun, HMAC, and PBKDF2).

Download Website Updated 20 May 2010 Solution

Screenshot
Pop 13.45
Vit 37.86

The Solution Framework class library is a collection of reusable types that are integrated with the Common Language Runtime. Solution Framework is compatible with Windows Mobile and Mono.

No download Website Updated 14 Nov 2011 CACKey

Screenshot
Pop 105.41
Vit 2.53

CACKey provides a standard interface (PKCS#11) for smartcards connected to a PC/SC compliant reader. It performs a similar function to "CoolKey", but only supports Government Smartcards. It supports all Government Smartcards that implement the Government Smartcard Interoperability Specification (GSC-IS) v2.1 or newer.

No download Website Updated 11 Jun 2010 ceofhack

Screenshot
Pop 21.28
Vit 1.00

ceofhack is a client for EOF (Eris Onion Forwarding), the secure, peer-to-peer (P2P), decentralized anonymous chat network.

Download No website Updated 24 Jun 2010 sphlib

Screenshot
Pop 36.55
Vit 1.00

sphlib provides optimized implementations in both C and Java of cryptographic hash functions. The C code includes "small footprint" variants optimized for architectures with low L1 cache (e.g. WiFi routers running OpenWRT). The C code comes with a command-line tool that can serve as a drop-in replacement for md5sum, sha1sum, sha256sum, etc. for all implemented hash functions. The Java code is compatible with J2ME. There are implementations of fourteen "second-round" SHA-3 candidates, for all output lengths: BLAKE, Blue Midnight Wish, CubeHash, ECHO, Fugue, Grøstl, Hamsi, JH, Keccak, Luffa, Shabal, SHAvite-3, SIMD, and Skein. Some pre-SHA-3 hash functions (including MD4, MD5, SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, RIPEMD-160, and others) are also implemented.

No download Website Updated 09 Apr 2014 Bitcoin Core

Screenshot
Pop 510.98
Vit 53.56

Bitcoin is a peer-to-peer electronic cash system that is completely decentralized, without the need for a central server or trusted parties. Users hold the crypto keys to their own money and transact directly with each other, with the help of a P2P network to check for double-spending.

Download Website Updated 11 Nov 2012 Industria

Screenshot
Pop 84.32
Vit 3.50

Industria is a collection of portable R6RS Scheme libraries for cryptography (AES, DES, Blowfish, HMAC, MD5, SHA-1, SHA-2, RSA, DSA, etc.), zip/gzip/zlib decompression, disassembly of amd64 machine code, Off-The-Record messaging, bytevector pack/unpack syntax, TLS connections via custom binary ports, and more.

Download No website Updated 05 Dec 2010 Golt

Screenshot
Pop 10.86
Vit 35.14

Golt is a simple tool for encrypting files and transfering them on a local network. Other portions of Golt include a simple crypto/utility toolkit to aid in rapid C/C++ development.

Download Website Updated 31 Mar 2014 NTRU

Screenshot
Pop 161.89
Vit 3.47

The NTRU public-key cryptosystem provides a Java implementation of the NTRUEncrypt and NTRUSign algorithms. Both algorithms are considered safe against quantum computer attacks. A C port of NTRUEncrypt is available, as well.

Screenshot

Project Spotlight

YAGF

A graphical frontend for the Cuneiform OCR tool.

Screenshot

Project Spotlight

iCaption

A simple-to-use soft subtitle editor, utilizing timeline based editing.