256 skills found · Page 5 of 9
Consensys / React Native SssaShamir's secret sharing algorithm for react-native
kryptco / SecretShare.swiftA swift implementation of Shamir's Secret Sharing over GF(2^8)
NethermindEth / Research MnemonicShamir secret sharing for mnemonic lists
dsprenkels / Sss GoGo bindings for my shamir-secret-sharing library
Internet-of-People / Slip39 RustSLIP-0039 compatible secret sharing tool
Shamir-Lab / FaucetThis is the codebase for Faucet, described in our manuscript: https://academic.oup.com/bioinformatics/article/34/1/147/4004871, by Roye Rozov, Gil Goldshlager, Eran Halperin, and Ron Shamir
lonkey / Simple Cryptographic AlgorithmsPython library for demonstrating the functionality of common cryptographic algorithms
lbibe / CodeLattice-based signature and Identity-Based Encryption are well-known cryptographic schemes, and having both efficient and provable secure schemes in the standard model is still a challenging task in light of the current NIST post-quantum competition. We address this problem in this paper by mixing standard IBE scheme, \`a la ABB (EUROCRYPT 2010) on Ring-SIS/LWE assumptions with the efficient trapdoor of Peikert and Micciancio (EUROCRYPT 2012) and we provide an efficient implementation. Our IBE scheme is more efficient than the IBE scheme of Ducas, Lyubashevsky and Prest based on NTRU assumption and is based on more standard assumptions. Although our signature scheme is not as efficient as recent lattice-based schemes based on Fiat-Shamir with Aborts, it is provably secure in the standard model and its efficiency is a few milliseconds.
bilalcorbacioglu / Secret SharingShamir's Secret Sharing(Image) Algorithm
ginsburgnm / PyseltongueShamir Secret Sharing library
wavefnx / ShamirsA cryptographic library for splitting and reconstructing secrets using Shamir's Secret Sharing.
HyTruongSon / InvariantGraphNetworks PyTorchA PyTorch implementation of The ICLR 2019 paper "Invariant and Equivariant Graph Networks" by Haggai Maron, Heli Ben-Hamu, Nadav Shamir and Yaron Lipman https://openreview.net/forum?id=Syx72jC9tm. The official TensorFlow implementation is at https://github.com/Haggaim/InvariantGraphNetworks.
KPN-CISO / Shamir SecretA set of commandline tools for creating and recovering Shamir Secret Shares.
SSSaaS / Sssaas CliCommand line client for splitting secrets using Shamir's Secret Sharing Algorithm
agl / ShamirsplitThe shamirsplit package implements Shamir's cryptographic secret sharing algorithm
patidarayush11 / RSA CalculatorRSA is the algorithm used by modern computers to encrypt and decrypt messages. It is an asymmetric cryptographic algorithm. Asymmetric means that there are two different keys. This is also called public key cryptography, because one of them can be given to everyone. The other key must be kept private. It is based on the fact that finding the factors of an integer is hard (the factoring problem). RSA stands for Ron Rivest, Adi Shamir and Leonard Adleman, who first publicly described it in 1978. A user of RSA creates and then publishes the product of two large prime numbers, along with an auxiliary value, as their public key. The prime factors must be kept secret. Anyone can use the public key to encrypt a message, but with currently published methods, if the public key is large enough, only someone with knowledge of the prime factors can feasibly decode the message
linriguang / An Image Encryption Scheme Based On Lorenz Hyperchaotic System And RSA AlgorithmThis research proposes a new image encryption scheme based on Lorenz hyperchaotic system and Rivest-Shamir-Adleman (RSA) algorithm. Firstly, the initial values of the Lorenz hyperchaotic system are generated by RSA algorithm, and the keystream is produced iteratively. In order to change the position and gray value of the pixel, the image data are hidden by additive mode diffusion. Secondly, the diffusion image matrix is reshaped into a one-dimensional image matrix, which is confused without repetition to hide the image data again. Then, the finite field diffusion algorithm is executed to realize the third hiding of the image information. In order to diffuse the pixel information into the entire cipher image, the additive mode diffusion algorithm needs to be looped twice. Finally, the cipher image can be obtained. The experimental results prove that the image encryption scheme proposed in this research is effective, and has strong anti-attack and key sensitivity. Moreover, the security of this encryption scheme relies on the RSA algorithm, which has high security.
onetwopunch / ShamShamir secret splitting for everyone
lapets / ShamirsMinimal pure-Python implementation of Shamir's secret sharing scheme.
rustyhorde / SssShamir's Secret Sharing implemented in Rust