rsa-cryptography
There are 795 repositories under rsa-cryptography topic.
drduh/YubiKey-Guide
Guide to using YubiKey for GnuPG and SSH
chris2511/xca
X Certificate and Key management
tarcisio-marinho/GonnaCry
A Linux Ransomware
life4/enc
🔑🔒 A modern and friendly CLI alternative to GnuPG: generate and download keys, encrypt, decrypt, and sign text and files, and more.
sybrenstuvel/python-rsa
Python-RSA is a pure-Python RSA implementation.
x011/SecretPixel
SecretPixel is a cutting-edge steganography tool designed to securely conceal sensitive information within images. It stands out in the realm of digital steganography by combining advanced encryption, compression, and a seeded Least Significant Bit (LSB) technique to provide a robust solution for embedding data undetectably.
spamegg1/Math-for-CS-solutions
Solutions to In-Class questions, Problem Sets and Exams of MIT Mathematics for Computer Science 2015 (same as 2019 Open Learning Library)
Kitura/BlueRSA
RSA public/private key encryption, private key signing and public key verification in Swift using the Swift Package Manager. Works on iOS, macOS, and Linux (work in progress).
secureyourself7/python-keylogger
Advanced Pure-Python Keylogger
itbackyard/CryptoNet
CryptoNet is simple, fast and a lightweight asymmetric and symmetric encryption library.
NobleMajo/vault
File encryption and decryption cli tool written in go.
secutils-dev/secutils
Secutils.dev is an open-source, versatile, yet simple security toolbox for engineers and researchers
ihebski/factordb
RSA primes numbers /RSA/CTFs
SKocur/Image-Cipher
Steganography software for encrypting text into image that uses modified version of LSB (Least Significant Bit) algorithm.
Catherine22/SecuritySample
(Android) Hide encrypted secret API keys in C/C++ code, retrieve and decrypt them via JNI. Google SafetyNet APIs example.
vittorioPiotti/FermatAndRSA-Java
Soluzione software in Java che genera e salva su file i numeri primi con algoritmo di Fermat e algoritmo di crittografia RSA
azadkuh/mbedcrypto
a portable, small, easy to use and fast c++14 library for cryptography.
vesvault/libVES.c
VESvault End-to-End Encryption API: Encrypt Everything Without Fear of Losing the Key
HexPandaa/RSA-Common-Modulus-Attack
A simple Python 3 script to perform Common Modulus attacks on RSA
konstantinullrich/crypton
A simple Dart library for asymmetric encryption and digital signatures
git-akshat/CNS-Lab
Cryptography and Network Security Lab programs done in 7th semester of SIT(VTU).
abumq/ripe
Lightweight cryptography library wrapper
namreeb/WardenSigning
Experimenting with Warden signature cracking
tarcisio-marinho/RSA
Simple RSA cryptographyc algorithm implementation
Xtrendence/X-Anonymous
An anonymous Node.js chat web application for end-to-end encrypted communication. All encryption is done on the client-side using RSA-2048/3072/4096, so the server literally knows nothing.
Sanix-Darker/kripta
A CrossLanguage Encryption Module to encrypt data/files (Asymmetric and Symmetric encryption handled)
denysdovhan/rsa-labwork
A javascript RSA algorithim encryption tool
DoniaEsawi/Your-Safe-Zone
A flutter desktop windows app for cyber security
longluo/RSA
RSA encryption and decryption Algorithms in C Language. ---RSA加解密算法的演示,C语言实现。
only2dhir/rsaencryption
RSA Encryption and Decryption in java
patidarayush11/RSA-Calculator
RSA is the algorithm used by modern computers to encrypt and decrypt messages. It is an asymmetric cryptographic algorithm. Asymmetric means that there are two different keys. This is also called public key cryptography, because one of them can be given to everyone. The other key must be kept private. It is based on the fact that finding the factors of an integer is hard (the factoring problem). RSA stands for Ron Rivest, Adi Shamir and Leonard Adleman, who first publicly described it in 1978. A user of RSA creates and then publishes the product of two large prime numbers, along with an auxiliary value, as their public key. The prime factors must be kept secret. Anyone can use the public key to encrypt a message, but with currently published methods, if the public key is large enough, only someone with knowledge of the prime factors can feasibly decode the message
sinamna/ChizCoin
simple blockchain implementation
AhmedIssa11/Real-Time-Secure-Chat-Application
real-time secure chat application from scratch with end-to-end encryption
ZeroBone/PollardRsaCracker
RSA cracking algorithm based on Pollard factorization (Pollard's p-1 method).
paulveillard/cybersecurity-static-analysis
An ongoing & curated collection of awesome vulnerability scanning software, libraries and frameworks, best guidelines, technical resources and most important static application security testing (SAST)
trhgquan/crypto
Cài đặt thuật & tóm tắt lí thuyết Mã hóa mật mã - fit@hcmus