A Crypto-Secure, Production-Grade Reliable-UDP Library for golang with FEC
-
Updated
Jul 27, 2024 - Go
A Crypto-Secure, Production-Grade Reliable-UDP Library for golang with FEC
crypto; from kruptein to hide or conceal
Complete and working ASP.NET Core Web APIs template with lot of examples: OAuth 2.0 Authentication, JSON Web Algorithms and Bearer Tokens (JWA, JWT, JWS, JWE), HMAC symmetric key, RSA X509 certificate asymmetric key, AES encryption, CQRS, DDD, MediatR, Dapper, Docker, Entity Framework, Fluent Validation, GZip, Hangfire, NLog, REST CRUD, Swagger...
🔐 Collection Of Various Implementations Of Cryptographic Algorithms From Scratch In Various Languages
Improved Search for Integral, Impossible Differential and Zero-Correlation Attacks: Application to Ascon, ForkSKINNY, SKINNY, MANTIS, PRESENT and QARMAv2
To develop a cryptography simulation that demonstrates secure communication over UDP using OpenSSL/MbedTLS libraries which showcases the use of cryptographic protocols for encryption, confidentiality.
This project demonstrates secure communication using mbedTLS/OpenSSL, featuring digital certificates, a `CrytoWrapper` class, SIGMA protocol implementation, and secure encryption/decryption with session destruction.
Encrypt strings and files symmetrically using Argon2id key derivation + AES-256 (GCM) or ChaCha20-Poly1305.
功能名:隐秘的奥尔德雷斯之谜 Function Name: OaldresPuzzle-Cryptic
End-to-End Encryption with Python Socket Communication This Python project demonstrates end-to-end encryption (E2EE) using the x25519 key exchange protocol and AES encryption for secure communication between a client (Alice) and a server (Bob) over a socket connection.
Encrypts & Decrypts an Image based on four most important encryption methods
SpiralKey is a cutting-edge cryptographic method that combines the robustness of symmetric key encryption with the captivating properties of spiral matrices
SpiralKey is a cutting-edge cryptographic method that combines the robustness of symmetric key encryption with the captivating properties of spiral matrices.
Data security project aims to implement various algorithms using c#
An academic project developed for IT352 Information Assurance and Security course at NITK Surathkal, implementing a novel chaotic PRNG for secure image encryption. Features include a unique combination of chaotic maps, robust image cipher system, and a user-friendly Flask-based interface for experimentation.
Cybersecurity Project - Repositry contains [windows and android] application which uses Symmetric - Encryption for encrypting any file
An Automatic Tool to Search for Full Impossible-Differential, Zero-Correlation and Integral Attacks
Encounter a superior layer of security with this file encryption and decryption tool written in go. This utility offers advanced protection mechanisms to safeguard your sensitive data with ease and reliability.
Lightweight Block Cipher GIFT-64 and GIFT-128
HIGh security and light weigHT
Add a description, image, and links to the symmetric-key-cryptography topic page so that developers can more easily learn about it.
To associate your repository with the symmetric-key-cryptography topic, visit your repo's landing page and select "manage topics."