Search Results for "elliptic curve cryptography"

Showing 31 open source projects for "elliptic curve cryptography"

View related business solutions
  • The AI workplace management platform Icon
    The AI workplace management platform

    Plan smart spaces, connect teams, manage assets, and get insights with the leading AI-powered operating system for the built world.

    By combining AI workflows, predictive intelligence, and automated insights, OfficeSpace gives leaders a complete view of how their spaces are used and how people work. Facilities, IT, HR, and Real Estate teams use OfficeSpace to optimize space utilization, enhance employee experience, and reduce portfolio costs with precision.
    Learn More
  • Agentic AI SRE built for Engineering and DevOps teams. Icon
    Agentic AI SRE built for Engineering and DevOps teams.

    No More Time Lost to Troubleshooting

    NeuBird AI's agentic AI SRE delivers autonomous incident resolution, helping team cut MTTR up to 90% and reclaim engineering hours lost to troubleshooting.
    Learn More
  • 1
    Constantine

    Constantine

    Modular, high-performance, zero-dependency cryptography stack

    High-performance cryptography for proof systems and blockchain protocols. This library provides a constant-time implementation of cryptographic primitives with a particular focus on cryptography used in blockchains and zero-knowledge-proof systems. The library aims to be a fast, compact and hardened library for elliptic curve cryptography needs, in particular for blockchain protocols and zero-knowledge proofs system.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 2

    Ed448-Goldilocks

    A 448-bit Edwards curve

    This is an implementation of elliptic curve cryptography using the Montgomery and Edwards curves Curve25519, Ed25519, Ed448-Goldilocks and Curve448, using the Decaf / Ristretto encoding.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 3
    OpenPGP.js

    OpenPGP.js

    OpenPGP implementation for JavaScript

    ...It should allow you to sign, encrypt, decrypt, and verify any kind of text, in particular e-mails, as well as managing keys. Version 3.0.0 of the library introduces support for public-key cryptography using elliptic curves. We use native implementations on browsers and Node.js when available.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 4
    EDGE Toolkit

    EDGE Toolkit

    Cross-platform Integrated Security Suite written in Go

    Multi-purpose cross-platform hybrid cryptography tool for symmetric and asymmetric encryption, cipher-based message authentication code (CMAC/PMAC/GMAC/VMAC), recursive hash digest, hash-based message authentication code (HMAC), HMAC-based key derivation function (HKDF), password-based key derivation function (PBKDF2/Argon2/Scrypt), password-hashing scheme (Bcrypt/Argon2/Makwa), shared key agreement (ECDH/VKO/X25519), digital signature (RSA/ECDSA/EdDSA/GOST/SPHINCS+), X.509 CSRs, CRLs and...
    Downloads: 1 This Week
    Last Update:
    See Project
  • Turn traffic into pipeline and prospects into customers Icon
    Turn traffic into pipeline and prospects into customers

    For account executives and sales engineers looking for a solution to manage their insights and sales data

    Docket is an AI-powered sales enablement platform designed to unify go-to-market (GTM) data through its proprietary Sales Knowledge Lake™ and activate it with intelligent AI agents. The platform helps marketing teams increase pipeline generation by 15% by engaging website visitors in human-like conversations and qualifying leads. For sales teams, Docket improves seller efficiency by 33% by providing instant product knowledge, retrieving collateral, and creating personalized documents. Built for GTM teams, Docket integrates with over 100 tools across the revenue tech stack and offers enterprise-grade security with SOC 2 Type II, GDPR, and ISO 27001 compliance. Customers report improved win rates, shorter sales cycles, and dramatically reduced response times. Docket’s scalable, accurate, and fast AI agents deliver reliable answers with confidence scores, empowering teams to close deals faster.
    Learn More
  • 5
    NaviServer

    NaviServer

    NaviServer, a high performance web server written in C and Tcl

    NaviServer is an extensible web server suited to create scalable websites and services. Originally based on AOLserver (http://www.aolserver.com), the ongoing development is done independently under Mozilla Public License by a core group of people that use it for their businesses and by other supporters. Features: High performance multi-threaded architecture, massively scalable and extensible, many modules, dynamic scripted pages (ADP), caching functions (static files, Tcl byte code,...
    Leader badge
    Downloads: 10 This Week
    Last Update:
    See Project
  • 6

    strobe

    STROBE cryptographic protocol framework

    ...It supports encryption/decryption, hashing, pseudorandom generation and message authentication. It integrates these components in an innovative way that makes secure protocol design relatively simple. With the included elliptic curve code, STROBE additionally supports asymmetric key exchange and digital signature creation and verification.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7

    ecc-objc

    Elliptic Curve Cryptography

    Elliptic Curve Cryptography with Portable Object Compiler and Computer Algebra Kit
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    VKO

    VKO

    GOST R 34.10-2012 VKO key agreement function (RFC 7836)

    VKO (выработка ключа общего) is an elliptic curve Diffie-Hellman key agreement function using GOST R 34.10-2012. It allows two parties to jointly agree on a shared secret using an insecure channel. This project is licensed under the ISC License. Copyright © 2020-2021 ALBANESE Research Lab Source code: https://github.com/pedroalbanese/vko Visit: http://albanese.atwebpages.com
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    X25519

    X25519

    NIST SP800-186 X25519 key agreement function written in Go

    X25519 is an elliptic curve Diffie-Hellman key exchange using Curve25519 [NIST SP800-186]. It allows two parties to jointly agree on a shared secret using an insecure channel. The original Curve25519 paper defined it as a Diffie-Hellman (DH) function. Daniel J. Bernstein has since proposed that the name Curve25519 be used for the underlying curve, and the name X25519 for the DH function.
    Downloads: 0 This Week
    Last Update:
    See Project
  • AestheticsPro Medical Spa Software Icon
    AestheticsPro Medical Spa Software

    Our new software release will dramatically improve your medspa business performance while enhancing the customer experience

    AestheticsPro is the most complete Aesthetics Software on the market today. HIPAA Cloud Compliant with electronic charting, integrated POS, targeted marketing and results driven reporting; AestheticsPro delivers the tools you need to manage your medical spa business. It is our mission To Provide an All-in-One Cutting Edge Software to the Aesthetics Industry.
    Learn More
  • 10
    Open source implementation of Elliptic Curve Primality Proving algorithm, using just the GMP library
    Downloads: 4 This Week
    Last Update:
    See Project
  • 11
    Libecc is an Elliptic Curve Cryptography C++ library for fixed size keys in order to achieve a maximum speed. The goal of this project is to become the first free Open Source library providing the means to generate safe elliptic curves.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 12
    ModularBipolynom

    ModularBipolynom

    Modular Polynom manipulation in Java

    XY modular Polynom manipulation in Java for calculating elliptic curves point order
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13

    sls

    SLS Team Java Library

    Java library with Cryptographic algorithms. Easy to use Crypto algorithms. Works on Windows, Linux, Android. No external lib dependencies, no useless abstractions, no 'crypto provider'. Elliptic curves was borrowed from BouncyCastle and simplified a lot. Most of EC classes are custom algorithms for certain curves. Can be easily deleted if u dont need them. With couple of classes u can parse and construct those ugly ASN.1 structures, look at RSA and EC key formats for example. No...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 14
    Hi anybody, This 7z allow you hiding many files using LSB Steganographic method in many pics, also let you the possibility to cipher the hidden files using private and public key with ECC(Elliptic curve cryptography), using BouncyCastle Java library or AES-256 bits. HOW TO USE: Its software needs JRE 1.7 or Higher!! Just unzip the dist.7z file and open Faster-Hiding.jar file, you can download the sources. Please open tickets if you found a problem or copyright trouble. Excuse me by your disturb.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15

    SSH Client Library for .Net

    Client library utilizing the Secure Shell protocol for .Net

    ...Includes support for tty, sftp, local port forwarding, remote port forwarding, dynamic port forwarding, and remote execution. Additionally supports the following: Key Exchange: Diffie Hellman Group 1 and Group 14 with SHA1, and Group Exhange with SHA1 or SHA256, Elliptic Curve Diffie Hellman with SHA2 and NIST curves 256, 384, and 521 Encryption: AES128, 192, and 256, and TripleDES in Counter or CBC mode, Cast128 and Blowfish in CBC mode, and TripleDES in EBC mode Authentication: Password, PublicKey (OpenSSH DSS, RSA, and ECDSA, PuTTy DSS, and RSA) Message Authentication: HMAC using SHA256, 384, and 512, SHA1, RipeMD160, MD5, MD5-96, and SHA1-96.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16

    Elliptic Curve Applet

    Elliptic Curve Applet

    This project is about Java implementation of various algorithms related to Elliptic Curve and its Cryptography (potentially). To get an idea about the subject matter, read these articles on Wikipedia: http://en.wikipedia.org/wiki/Elliptic_curve http://en.wikipedia.org/wiki/Elliptic_curve_cryptography
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    This is the former home of pyecm, which has now been moved to github: https://github.com/martingkelly/pyecm Pyecm factors large integers (up to 50 digits) using the Elliptic Curve Method (ECM), a fast factoring algorithm.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 18
    National Ukrainian standard of digital signature based on elliptic curves (DSTU 4145-2002).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    A smart card-based public key cryptography system based on elliptic curves, using AES for session key generation and SHA for hashing. This project will include the smart card software, terminal software, and a public key server.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Random Thoughts On Distributed Algorithms: a collection of tools and ideas for the development of distributed applications. The first released part is an RxRPC security model based on OpenSSL and elliptic curve criptography. Please check docs for info...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Open source implementation of Elliptic Curve Primality Proving algorithm
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    Crypt-EG is an easy visual cryptosystem program that implements ElGamal method using elliptic curves.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    An elliptic curve based encryption system for secure and private communications at the network level. Public key encryption is used to automatically negotiate keys for AES encryption links between all nodes in use. Dev version uses orinoco drivers.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    Being that Sun\'s Java Cryptography Extension (JCE) is not well-documented and has a steep learning curve, the vH Crypto API for Java is being created to abstract the procedures which are commonly used in cryptography.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    ECCard - a library for elliptic curve cryptographie
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • Next
MongoDB Logo MongoDB