Split and distribute your private keys securely amongst untrusted network
-
Updated
Jan 28, 2022 - Go
Split and distribute your private keys securely amongst untrusted network
Ansible role to manage ssh keys in Debian-like systems
Cordova plugin for securely saving keys, passwords or strings on devices.
Implementation of a system capable of encryption and decryption of multimedia data (Text, Images, Videos, Audio etc.) using a hybrid model based on the amalgamation of symmetric encryption techniques such as AES and asymmetric techniques such as ECC.
ONIXLabs .NET Library - Includes powerful APIs for functional and object-oriented programming, security, cryptography and numerics.
tl;dr: Localhost HTTP Signatures proxy.
blockchain — A Elixir-based blockchain engine.
Recover your Bitcoin private keys and wallets with BTC Private Key Finder. Enhance your digital wallet security and recovery processes with robust tools ensuring effective recovery.
Net Core Jwt Asymmetric Signing with public private key
Ansible Playbook to automate the process of granting / revoking SSH access to a group of servers instances to a new user
Implementation of the Signal Protocol, which provides forward secrecy and deniability by use of elliptic curve cryptography, Diffie-Hellman key exchange and end-to-end encryption.
Very simple RSA implementation to demonstrate the use of public and private keys to encrypt and decrypt messages
Common Crypto functions in Go
Secure simple device based authentication, OAuth 2.0 and OIDC compatible
Digital signature
Advanced Encryption Standard (AES)
Personal accounting, but with superpowers.
A project to set up a Linux server on a virtual machine to host a web application, install and configure web and database server. This project was evaluated and met specifications as a part of the full stack web developer NanoDegree program by Udacity.
Secure Chat Application that supports multi multi group conversations and files upload with secure channels based on TLS protocol, management of cryptographic keys and the generation of secure syntheses, ciphers and digital signatures
Add a description, image, and links to the public-private-key topic page so that developers can more easily learn about it.
To associate your repository with the public-private-key topic, visit your repo's landing page and select "manage topics."