Loading...
Browse 41 cryptography tools
Quantum computing consulting services for government and enterprise clients
Quantum computing consulting services for government and enterprise clients
Email encryption software using FIPS 140-2 compliant modules and RSA keys
Email encryption software using FIPS 140-2 compliant modules and RSA keys
KCMVP-certified crypto module for file/transmission encryption & key mgmt
KCMVP-certified crypto module for file/transmission encryption & key mgmt
Data encryption solutions for protecting data at rest and in transit
Data encryption solutions for protecting data at rest and in transit
Platform for chip security testing and binary security analysis
DNS security posture management across multicloud and on-prem environments
DNS security posture management across multicloud and on-prem environments
Cryptography and IAM consulting services with PKI and certificate mgmt.
Cryptography and IAM consulting services with PKI and certificate mgmt.
Cryptographic asset discovery and inventory tool for IBM Z mainframes
Cryptographic asset discovery and inventory tool for IBM Z mainframes
Post-quantum cryptography library with NIST-standardized algorithms
Post-quantum cryptography library with NIST-standardized algorithms
Identifies cryptographic algorithms and libraries in code for compliance
Identifies cryptographic algorithms and libraries in code for compliance
OpenFHE is an open-source library implementing post-quantum Fully Homomorphic Encryption schemes with simplified APIs and cross-platform support.
OpenFHE is an open-source library implementing post-quantum Fully Homomorphic Encryption schemes with simplified APIs and cross-platform support.
Zama's fhEVM Coprocessor is an open-source tool for developing applications using Fully Homomorphic Encryption, enabling privacy-preserving computations in various domains.
Zama's fhEVM Coprocessor is an open-source tool for developing applications using Fully Homomorphic Encryption, enabling privacy-preserving computations in various domains.
Microsoft SEAL is an open-source homomorphic encryption library that enables arithmetic computations on encrypted data without decryption, supporting privacy-preserving applications across multiple platforms.
Microsoft SEAL is an open-source homomorphic encryption library that enables arithmetic computations on encrypted data without decryption, supporting privacy-preserving applications across multiple platforms.
A tool for creating encrypted volumes with self-destruction capabilities that automatically destroy data when tampering is detected or commands are issued.
A tool for creating encrypted volumes with self-destruction capabilities that automatically destroy data when tampering is detected or commands are issued.
A PHP library that provides secure data encryption capabilities using keys or passwords, designed to minimize implementation errors.
A PHP library that provides secure data encryption capabilities using keys or passwords, designed to minimize implementation errors.
Tang is a network-based server that binds encrypted data access to network presence, allowing data decryption only when clients are connected to the specific network where the Tang server operates.
Tang is a network-based server that binds encrypted data access to network presence, allowing data decryption only when clients are connected to the specific network where the Tang server operates.
A deep dive into the Ledger connect-kit compromise decryption process.
A deep dive into the Ledger connect-kit compromise decryption process.
A cryptographic framework that secures software update systems by enabling publishers to sign content offline and consumers to verify authenticity through trusted verification mechanisms.
A cryptographic framework that secures software update systems by enabling publishers to sign content offline and consumers to verify authenticity through trusted verification mechanisms.
Hash Extender is a command-line tool that automates length extension attacks against various hashing algorithms including MD5, SHA-1, SHA-256, and others.
Hash Extender is a command-line tool that automates length extension attacks against various hashing algorithms including MD5, SHA-1, SHA-256, and others.
Using high-quality entropy sources for CSPRNG seeding is crucial for security.
Using high-quality entropy sources for CSPRNG seeding is crucial for security.
Microsoft Azure's dedicated HSM for secure key management and cryptographic operations.
Microsoft Azure's dedicated HSM for secure key management and cryptographic operations.
A JavaScript steganography module that hides encrypted secrets within text using invisible Unicode characters for covert communication across web platforms.
A JavaScript steganography module that hides encrypted secrets within text using invisible Unicode characters for covert communication across web platforms.
A set of 48 practical programming exercises in cryptography and application security
A set of 48 practical programming exercises in cryptography and application security
Get strategic cybersecurity insights in your inbox
Real-time OSINT monitoring for leaked credentials, data, and infrastructure
A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.
AI security assurance platform for red-teaming, guardrails & compliance