Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
awesome-cryptography
A curated list of cryptography resources and links.
https://github.com/eric-erki/awesome-cryptography
Last synced: 4 days ago
JSON representation
-
Resources
-
Blogs
- Salty Hash - Covers topics on encryption, data control, privacy, and security.
- Charles Engelke's Blog - WebCrypto Blog Posts.
- Root Labs rdist - Nate Lawson and his co-authors write on a variety of topics including hardware implementation, cryptographic timing attacks, DRM, and the Commodore 64.
- Salty Hash - Covers topics on encryption, data control, privacy, and security.
- Schneier on security - One of the oldest and most famous security blogs. Bruce covers topics from block cipher cryptanalysis to airport security.
- Salty Hash - Covers topics on encryption, data control, privacy, and security.
- Salty Hash - Covers topics on encryption, data control, privacy, and security.
- Salty Hash - Covers topics on encryption, data control, privacy, and security.
- Salty Hash - Covers topics on encryption, data control, privacy, and security.
- Salty Hash - Covers topics on encryption, data control, privacy, and security.
- Salty Hash - Covers topics on encryption, data control, privacy, and security.
- Salty Hash - Covers topics on encryption, data control, privacy, and security.
- Salty Hash - Covers topics on encryption, data control, privacy, and security.
- Salty Hash - Covers topics on encryption, data control, privacy, and security.
- Salty Hash - Covers topics on encryption, data control, privacy, and security.
- Salty Hash - Covers topics on encryption, data control, privacy, and security.
- Salty Hash - Covers topics on encryption, data control, privacy, and security.
- Salty Hash - Covers topics on encryption, data control, privacy, and security.
- Salty Hash - Covers topics on encryption, data control, privacy, and security.
- Salty Hash - Covers topics on encryption, data control, privacy, and security.
- Salty Hash - Covers topics on encryption, data control, privacy, and security.
- Salty Hash - Covers topics on encryption, data control, privacy, and security.
- Salty Hash - Covers topics on encryption, data control, privacy, and security.
- Salty Hash - Covers topics on encryption, data control, privacy, and security.
- Salty Hash - Covers topics on encryption, data control, privacy, and security.
-
Mailing lists
- Modern Crypto - Forums for discussing modern cryptographic practice.
- randombit.net - List for general discussion of cryptography, particularly the technical aspects.
-
Web-tools
- Cryptolab - is a set of cryptography related tools.
- factordb.com - Factordb.com is tool used to store known factorizations of any number.
- keybase.io - Keybase maps your identity to your public keys, and vice versa.
-
Web-sites
- IACR - The International Association for Cryptologic Research is a non-profit scientific organization whose purpose is to further research in cryptology and related fields.
- Subreddit of Cryptography - This subreddit is intended for links and discussions surrounding the theory and practice of strong cryptography.
- WebCryptoAPI - This specification describes a JavaScript API for performing basic cryptographic operations in web applications, such as hashing, signature generation and verification, and encryption and decryption.
- Cryptopals Crypto Challenges - A series of applied cryptography challenges, starting from very basic challenges, such as hex to base 64 challanges, and gradually increasing the difficulty up to abstract algebra.
-
-
Frameworks and Libs
-
Delphi
-
Haskell
- Cryptography - Collaborative Hackage list.
- Cryptography & Hashing - Official Website of Haskell.
- Cryptonite - Haskell repository of cryptographic primitives.
-
JavaScript
- closure-library - Google's common JavaScript library.
-
C-sharp
- Bouncy Castle - All-purpose cryptographic library.
- libsodium-net - Secure cryptographic library, port of libsodium for .NET.
-
Clojure
- buddy-core - Cryptographic Api.
-
Common Lisp
- ironclad - Collection of common crypto shortcuts.
-
C++
-
C
- monocypher - small, portable, easy to use crypto library inspired by libsodium and TweetNaCl.
- NaCl - High-speed library for network communication, encryption, decryption, signatures, etc.
- themis - High level crypto library for storing data (AES), secure messaging (ECC + ECDSA / RSA + PSS + PKCS#7) and session-oriented, forward secrecy data exchange (ECDH key agreement, ECC & AES encryption). Ported on many languages and platforms, suitable for client-server infastructures.
-
Java
- Bouncy Castle - All-purpose cryptographic library. JCA provider, wide range of functions from basic helpers to PGP/SMIME operations.
- Flexiprovider - Powerful toolkit for the Java Cryptography Architecture.
- jbcrypt - jBCrypt is an implementation the OpenBSD Blowfish password hashing
-
Objective-C
- RNCryptor - CCCryptor (AES encryption) wrappers for iOS and Mac.
-
PHP
- halite - Simple library for encryption using `libsodium`.
-
Python
- cryptography - Python library which exposes cryptographic recipes and primitives.
- cryptopy - Pure python implmentation of cryptographic algorithms and applications.
-
Swift
- CryptoSwift - Crypto related functions and helpers for Swift implemented in Swift programming language.
- IDZSwiftCommonCrypto - Wrapper for Apple's [CommonCrypto](https://opensource.apple.com/source/CommonCrypto/) library written in Swift.
- SweetHMAC - Tiny and easy to use Swift class to encrypt strings using HMAC algorithms.
- Swift-Sodium - Swift interface to the Sodium library for common crypto operations for iOS and OS X.
- SwiftSSL - Elegant crypto toolkit in Swift.
-
-
Theory
-
Algorithms
- 3DES - Symmetric-key block cipher (or Triple Data Encryption Algorithm (TDEA or Triple DEA), which applies the Data Encryption Standard (DES) cipher algorithm three times to each data block.
- AES - Symmetric-key block cipher algorithm and U.S. government standard for secure and classified data encryption and decryption (also known as Rijndael).
- Blowfish - Symmetric-key block cipher, designed in 1993 by Bruce Schneier. Notable features of the design include key-dependent S-boxes and a highly complex key schedule.
- RSA - One of the first practical public-key cryptosystems and is widely used for secure data transmission. In RSA, this asymmetry is based on the practical difficulty of factoring the product of two large prime numbers, the factoring problem.
- MD5 - Widely used hash function producing a 128-bit hash value. MD5 was initially designed to be used as a cryptographic hash function, but it has been found to suffer from extensive vulnerabilities. It can still be used as a checksum to verify data integrity, but only against unintentional corruption.
- SHA1 - Cryptographic hash function designed by the NSA. SHA-1 produces a 160-bit hash value known as a message digest. SHA-1 is no longer considered secure against well-funded opponents.
- SHA2 - Set of hash functions designed by the NSA. SHA-256 and SHA-512 are novel hash functions computed with 32-bit and 64-bit words, respectively. They use different shift amounts and additive constants, but their structures are otherwise virtually identical, differing only in the number of rounds.
-
Articles
-
Books
- A Graduate Course in Applied Cryptography - The book covers many constructions for different tasks in cryptography.
- Crypto101 - Crypto 101 is an introductory course on cryptography.
- Handbook of Applied Cryptography - This book is intended as a reference for professional cryptographers.
- Introduction to Modern Cryptography - Introductory-level treatment of cryptography written from a modern, computer science perspective.
- OpenSSL Cookbook - The book about OpenSSL.
- Serious Cryptography - A Practical Introduction to Modern Encryption by Jean-Philippe Aumasson.
- The Cryptoparty Handbook - This book provides a comprehensive guide to the various topics of the computer and internet security.
- Understanding Cryptography - Often overlooked, this book is a boon for beginners to the field. It contains plenty of exercises at the end of each chapter, aimed at reinforcing concepts and cementing ideas.
-
Courses
- Applied Cryptography - Cryptography is present in everyday life, from paying with a credit card to using the telephone. Learn all about making and breaking puzzles in computing.
- Crypto Strikes Back! - This talk will cover crypto vulnerabilities in widely-deployed systems and how the smallest oversight resulted in catastrophe.
- Cryptography - A practical oriented course in Cryptography by University of Maryland College Park.
- Cryptography - Stanford University - This course explains the inner workings of cryptographic primitives and how to correctly use them. Students will learn how to reason about the security of cryptographic constructions and how to apply this knowledge to real-world applications.
- Cryptography I - The course begins with a detailed discussion of how two parties who have a shared secret key can communicate securely when a powerful adversary eavesdrops and tampers with traffic. We will examine many deployed protocols and analyze mistakes in existing systems.
- Journey into cryptography - The course of cryptography by Khan Academy.
- Theory and Practice of Cryptography - Introduction to Modern Cryptography, Using Cryptography in Practice and at Google, Proofs of Security and Security Definitions and A Special Topic in Cryptography.
-
Other lists
-
-
Tools
-
Standalone
- gpg - Complete and free implementation of the OpenPGP standard. It allows to encrypt and sign your data and communication, features a versatile key management system. GnuPG is a command line tool with features for easy integration with other applications.
- ves - End-to-end encrypted sharing via cloud repository, secure recovery through a viral network of friends in case of key loss.
-
-
Contributing
-
Web-sites
-
Sub Categories
Keywords
cryptography
4
swift
3
python
1
php
1
owasp
1
objective-c
1
javascript
1
java
1
ios
1
golang
1
encryption
1
cryptography-library
1
authentication
1
asymmetric-cryptography
1
howto
1
awesome-lists
1
awesome-list
1
awesome
1
applied-cryptography
1
libsodium
1
sha3
1
sha1
1
md5
1
hmac-authentication
1
hmac
1
digest
1
cryptoswift
1
commoncrypto
1
cipher
1
aes-gcm
1
aes
1
symmetric-cryptography
1
security
1
secure-storage
1
secure-messenger
1
rust
1
ruby
1