Search results
Results from the WOW.Com Content Network
This table denotes, if a cryptography library provides the technical requisites for FIPS 140, and the status of their FIPS 140 certification (according to NIST's CMVP search, [27] modules in process list [28] and implementation under test list).
PyCrypto – The Python Cryptography Toolkit PyCrypto, extended in PyCryptoDome; keyczar – Cryptography Toolkit keyczar; M2Crypto – M2Crypto is the most complete OpenSSL wrapper for Python. Cryptography – Python library which exposes cryptographic recipes and primitives. PyNaCl – Python binding for libSodium (NaCl)
"Javascript Crypto Library". includes a Javascript implementation of Fortuna PRNG. Cooke, Jean-Luc (2005). "jlcooke's explanation of and improvements on /dev/random". Patch adding an implementation of Fortuna to the Linux kernel. Litzenberger, Dwayne (2013-10-20). "Fortuna implementation in Python, part of the Python Cryptography Toolkit". GitHub.
NaCl (Networking and Cryptography Library, pronounced "salt") is a public domain, high-speed software library for cryptography. [ 2 ] NaCl was created by the mathematician and programmer Daniel J. Bernstein , who is best known for the creation of qmail and Curve25519 .
python-paillier a library for Partially Homomorphic Encryption in Python, including full support for floating point numbers. The Paillier cryptosystem interactive simulator Archived 2012-02-18 at the Wayback Machine demonstrates a voting application. An interactive demo of the Paillier cryptosystem.
Cryptol is a domain-specific programming language for cryptography developed by the Portland, Oregon based software development firm, Galois, Inc. [1] [2] It is free and open-source software released under a BSD 3-clause software license. The language was originally developed for use by the United States National Security Agency.
NTRU is an open-source public-key cryptosystem that uses lattice-based cryptography to encrypt and decrypt data. It consists of two algorithms: NTRUEncrypt, which is used for encryption, and NTRUSign, which is used for digital signatures. Unlike other popular public-key cryptosystems, it is resistant to attacks using Shor's algorithm ...
Bouncy Castle started when two colleagues were tired of having to re-invent a set of cryptography libraries each time they changed jobs working in server-side Java SE.One of the developers was active in Java ME (J2ME at that time) development as a hobby and a design consideration was to include the greatest range of Java VMs for the library, including those on J2ME.