Implementation of IM-DSSE framework
-
Updated
Dec 26, 2017 - C++
Implementation of IM-DSSE framework
A very useless hashing algorithm based on MD5 that probably has more hash collisions than MD5
A Streamlit-based interactive app that generates large primes, compares primality algorithms, and demonstrates real-world RSA encryption and decryption using those primes.
Implementation of the SHA-256 cryptographic hash algorithm.
Repository related to CENG471 course I have taken in IZTECH
HMAC-based key derivation function (HKDF) standalone implementation using pure Python.
Repository containing the artifacts generated in the work "Analysis of eSTREAM Profile II Ciphers for Image Encryption". The files contained herein were developed during the master's degree in Computer Science at the Universidade Federal de Lavras.
Jumble - Cryptographic Tools Android Application
A secure and efficient AES encryption implementation in C# demonstrating cryptographic best practices with automatic IV handling, CBC mode operation, and comprehensive error management. Perfect for educational purposes and as a foundation for secure data protection solutions.
This repository contains C (Programming Language) implementations of 15 Classical Cryptopgraphy Algorithms, including substitution, transposition, and polygraphic ciphers for academic reference and hands-on learning.
Python implementation of format preserving encryption defined as a NIST draft (FF1, FF3-1)
RSA assymetric criptography. Quick implementation in C++.
Implementation of Chou-Orlandi Oblivious Transfer protocol
It is our first minor project, where we developed a secure multithreaded messaging application in Java, integrating socket programming with encryption techniques to ensure secure and reliable peer-to-peer communication.
Post-classical cryptographic engine with entropy-regenerative architecture
🔐 Protect your digital notes with CryptexPad, a secure platform for encrypted note-taking and collaboration, prioritizing your privacy.
This is an encryption and decryption algorithm based on randomly generated integers
Add a description, image, and links to the cryptographic-algorithms topic page so that developers can more easily learn about it.
To associate your repository with the cryptographic-algorithms topic, visit your repo's landing page and select "manage topics."