update lists

This commit is contained in:
2025-07-18 22:22:32 +02:00
parent 55bed3b4a1
commit 5916c5c074
3078 changed files with 331679 additions and 357255 deletions

View File

@@ -1,4 +1,4 @@
 Awesome Cryptography !Awesome (https://cdn.rawgit.com/sindresorhus/awesome/d7305f38d29fed78fa85652e3a63e154dd8e8829/media/badge.svg) (https://github.com/sindresorhus/awesome)
 Awesome Cryptography !Awesome (https://cdn.rawgit.com/sindresorhus/awesome/d7305f38d29fed78fa85652e3a63e154dd8e8829/media/badge.svg) (https://github.com/sindresorhus/awesome)
 
@@ -76,26 +76,26 @@
Asymmetric encryption
- DH (https://en.wikipedia.org/wiki/Diffie%E2%80%93Hellman_key_exchange) - A method of exchanging cryptographic keys securely over a public channel. Unlike RSA, the Diffie-Hellman Key Exchange is not encryption, and is only a way for 
two parties to agree on a shared secret value. Since the keys generated are completely pseudo-random, DH key exchanges can provide forward secrecy (https://en.wikipedia.org/wiki/Forward_secrecy).
- DH (https://en.wikipedia.org/wiki/Diffie%E2%80%93Hellman_key_exchange) - A method of exchanging cryptographic keys securely over a public channel. Unlike RSA, the Diffie-Hellman Key Exchange is not encryption, and is only a way for two parties 
to agree on a shared secret value. Since the keys generated are completely pseudo-random, DH key exchanges can provide forward secrecy (https://en.wikipedia.org/wiki/Forward_secrecy).
- ECC (https://en.wikipedia.org/wiki/Elliptic-curve_cryptography) - Public-key cryptosystems based on the algebraic structure of elliptic curves over finite fields.
- RSA (https://en.wikipedia.org/wiki/RSA_(cryptosystem)) - One of the first practical public-key cryptosystems and is widely used for secure data transmission. In RSA, this asymmetry is based on the practical difficulty of factoring the
product of two large prime numbers, the factoring problem.
- RSA (https://en.wikipedia.org/wiki/RSA_(cryptosystem)) - One of the first practical public-key cryptosystems and is widely used for secure data transmission. In RSA, this asymmetry is based on the practical difficulty of factoring the product 
of two large prime numbers, the factoring problem.
Transform Encryption
- Transform Encryption (aka Proxy Re-Encryption) (https://docs.ironcorelabs.com/concepts/transform-encryption) - Transform encryption uses three mathematically related keys: one to encrypt plaintext to a recipient, a second to decrypt 
the ciphertext, and a third to transform ciphertext encrypted to one recipient so it can be decrypted by a different recipient.
- Transform Encryption (aka Proxy Re-Encryption) (https://docs.ironcorelabs.com/concepts/transform-encryption) - Transform encryption uses three mathematically related keys: one to encrypt plaintext to a recipient, a second to decrypt the 
ciphertext, and a third to transform ciphertext encrypted to one recipient so it can be decrypted by a different recipient.
Hash functions
- MD5 (https://en.wikipedia.org/wiki/MD5) - Widely used hash function producing a 128-bit hash value. MD5 was initially designed to be used as a cryptographic hash function, but it has been found to suffer from extensive 
vulnerabilities. It can still be used as a checksum to verify data integrity, but only against unintentional corruption.
- MD5 (https://en.wikipedia.org/wiki/MD5) - Widely used hash function producing a 128-bit hash value. MD5 was initially designed to be used as a cryptographic hash function, but it has been found to suffer from extensive vulnerabilities. It can 
still be used as a checksum to verify data integrity, but only against unintentional corruption.
- SHA1 (https://en.wikipedia.org/wiki/SHA-1) - Cryptographic hash function designed by the NSA. SHA-1 produces a 160-bit hash value known as a message digest. SHA-1 is no longer considered secure against well-funded opponents.
- SHA2 (https://en.wikipedia.org/wiki/SHA-2) - Set of hash functions designed by the NSA. SHA-256 and SHA-512 are novel hash functions computed with 32-bit and 64-bit words, respectively. They use different shift amounts and additive 
constants, but their structures are otherwise virtually identical, differing only in the number of rounds.
- SHA3 (https://en.wikipedia.org/wiki/SHA-3) - Cryptographic hash function that produces a fixed-size output, typically 224, 256, 384, or 512 bits, from variable-size input data. It is part of the SHA-3 family of cryptographic 
algorithms designed to resist attacks from quantum computers and offers security properties such as pre-image resistance, second pre-image resistance, and collision resistance.
- SHA2 (https://en.wikipedia.org/wiki/SHA-2) - Set of hash functions designed by the NSA. SHA-256 and SHA-512 are novel hash functions computed with 32-bit and 64-bit words, respectively. They use different shift amounts and additive constants, 
but their structures are otherwise virtually identical, differing only in the number of rounds.
- SHA3 (https://en.wikipedia.org/wiki/SHA-3) - Cryptographic hash function that produces a fixed-size output, typically 224, 256, 384, or 512 bits, from variable-size input data. It is part of the SHA-3 family of cryptographic algorithms designed
to resist attacks from quantum computers and offers security properties such as pre-image resistance, second pre-image resistance, and collision resistance.
Articles
@@ -107,38 +107,38 @@
- A Graduate Course in Applied Cryptography (https://crypto.stanford.edu/~dabo/cryptobook/) - The book covers many constructions for different tasks in cryptography.
- An Introduction to Mathematical Cryptography (http://www.math.brown.edu/~jhs/MathCryptoHome.html) - Introduction to modern cryptography.
- Applied Cryptography: Protocols, Algorithms and Source Code in C (https://www.wiley.com/en-ie/Applied+Cryptography%3A+Protocols%2C+Algorithms+and+Source+Code+in+C%2C+20th+Anniversary+Edition-p-9781119439028) - This cryptography 
classic provides you with a comprehensive survey of modern cryptography.
- Applied Cryptography: Protocols, Algorithms and Source Code in C (https://www.wiley.com/en-ie/Applied+Cryptography%3A+Protocols%2C+Algorithms+and+Source+Code+in+C%2C+20th+Anniversary+Edition-p-9781119439028) - This cryptography classic provides
you with a comprehensive survey of modern cryptography.
- Crypto101 (https://www.crypto101.io/) - Crypto 101 is an introductory course on cryptography.
- Cryptography Engineering (https://www.schneier.com/books/cryptography_engineering/) - Learn to build cryptographic protocols that work in the real world.
- Handbook of Applied Cryptography (https://cacr.uwaterloo.ca/hac/) - This book is intended as a reference for professional cryptographers.
- Introduction to Modern Cryptography (http://www.cs.umd.edu/~jkatz/imc.html) - Introductory-level treatment of cryptography written from a modern, computer science perspective.
- OpenSSL Cookbook (https://www.feistyduck.com/library/openssl-cookbook/) - The book about OpenSSL.
- Practical Cryptography for Developers (https://cryptobook.nakov.com) - Developer-friendly book on modern cryptography (hashes, MAC codes, symmetric and asymmetric ciphers, key exchange, elliptic curves, digital signatures) with lots 
of code examples.
- Practical Cryptography for Developers (https://cryptobook.nakov.com) - Developer-friendly book on modern cryptography (hashes, MAC codes, symmetric and asymmetric ciphers, key exchange, elliptic curves, digital signatures) with lots of code 
examples.
- Real World Cryptography (https://www.manning.com/books/real-world-cryptography/) - This book teaches you applied cryptographic techniques to understand and apply security at every level of your systems and applications.
- Security Engineering (http://www.cl.cam.ac.uk/~rja14/book.html) - There is an extraordinary textbook written by Ross Anderson, professor of computer security at University of Cambridge.
- Serious Cryptography (https://nostarch.com/seriouscrypto) - A Practical Introduction to Modern Encryption by Jean-Philippe Aumasson.
- The Code Book (https://simonsingh.net/books/the-code-book/) - This book is a digest of the history of cryptography, covering both ancient times, and newer cryptography methods. There are exercises at the end and the solution of those 
was rewarded with $10.000.
- The Code Book (https://simonsingh.net/books/the-code-book/) - This book is a digest of the history of cryptography, covering both ancient times, and newer cryptography methods. There are exercises at the end and the solution of those was 
rewarded with $10.000.
- The Cryptoparty Handbook (https://unglue.it/work/141611/) - This book provides a comprehensive guide to the various topics of the computer and internet security.
- Understanding Cryptography (http://www.crypto-textbook.com/) - Often overlooked, this book is a boon for beginners to the field. It contains plenty of exercises at the end of each chapter, aimed at reinforcing concepts and cementing 
ideas.
- Understanding Cryptography (http://www.crypto-textbook.com/) - Often overlooked, this book is a boon for beginners to the field. It contains plenty of exercises at the end of each chapter, aimed at reinforcing concepts and cementing ideas.
Courses
- A Self-Study Course In Block-Cipher Cryptanalysis (https://www.schneier.com/wp-content/uploads/2016/02/paper-self-study.pdf) - This paper attempts to organize the existing literature of block-cipher cryptanalysis in a way that 
students can use to learn cryptanalytic techniques and ways to break algorithms, by Bruce Schneier.
- Applied Cryptography (https://www.udacity.com/course/applied-cryptography--cs387) - Cryptography is present in everyday life, from paying with a credit card to using the telephone. Learn all about making and breaking puzzles in 
computing.
- A Self-Study Course In Block-Cipher Cryptanalysis (https://www.schneier.com/wp-content/uploads/2016/02/paper-self-study.pdf) - This paper attempts to organize the existing literature of block-cipher cryptanalysis in a way that students can use 
to learn cryptanalytic techniques and ways to break algorithms, by Bruce Schneier.
- Applied Cryptography (https://www.udacity.com/course/applied-cryptography--cs387) - Cryptography is present in everyday life, from paying with a credit card to using the telephone. Learn all about making and breaking puzzles in computing.
- Crypto Strikes Back! (https://www.youtube.com/watch?v=ySQl0NhW1J0) - This talk will cover crypto vulnerabilities in widely-deployed systems and how the smallest oversight resulted in catastrophe.
- Cryptography (https://www.coursera.org/learn/cryptography) - A practical oriented course in Cryptography by University of Maryland College Park.
- Cryptography - Stanford University (http://online.stanford.edu/course/cryptography) - This course explains the inner workings of cryptographic primitives and how to correctly use them. Students will learn how to reason about the 
security of cryptographic constructions and how to apply this knowledge to real-world applications.
- Cryptography I (https://www.coursera.org/learn/crypto) - The course begins with a detailed discussion of how two parties who have a shared secret key can communicate securely when a powerful adversary eavesdrops and tampers with 
traffic. We will examine many deployed protocols and analyze mistakes in existing systems.
- Cybrary Cryptography (https://www.cybrary.it/course/cryptography/) - This online course we will cover how cryptography is the cornerstone of security, and how through its use of different encryption methods, such as ciphers, and 
public or private keys, you can protect private or sensitive information from unauthorized access.
- Cryptography - Stanford University (http://online.stanford.edu/course/cryptography) - This course explains the inner workings of cryptographic primitives and how to correctly use them. Students will learn how to reason about the security of 
cryptographic constructions and how to apply this knowledge to real-world applications.
- Cryptography 101: Building Blocks (https://cryptography101.ca/crypto101-building-blocks/) - This introductory course (Fall 2024) by Alfred Menezes covers the fundamental cryptographic primitives: symmetric-key encryption, hash functions, MACs, 
authenticated encryption, public-key encryption, signatures, key agreement, RSA, elliptic curve cryptography.
- Cryptography I (https://www.coursera.org/learn/crypto) - The course begins with a detailed discussion of how two parties who have a shared secret key can communicate securely when a powerful adversary eavesdrops and tampers with traffic. We 
will examine many deployed protocols and analyze mistakes in existing systems.
- Cybrary Cryptography (https://www.cybrary.it/course/cryptography/) - This online course we will cover how cryptography is the cornerstone of security, and how through its use of different encryption methods, such as ciphers, and public or 
private keys, you can protect private or sensitive information from unauthorized access.
- Harvard's Cryptography Lecture notes (https://intensecrypto.org/) - An introductory but fast-paced undergraduate/beginning graduate course on cryptography, Used for Harvard CS 127.
- Journey into cryptography (https://www.khanacademy.org/computing/computer-science/cryptography) - The course of cryptography by Khan Academy.
- Practical Aspects of Modern Cryptography (http://courses.cs.washington.edu/courses/csep590/06wi/) - Practical Aspects of Modern Cryptography, Winter 2006 University of Washington CSE.
@@ -149,6 +149,7 @@
- Awesome crypto-papers (https://github.com/pFarb/awesome-crypto-papers) A curated list of cryptography papers, articles, tutorials and howtos.
- Awesome HE (https://github.com/jonaschn/awesome-he) A curated list of homomorphic encryption libraries, software and resources.
- TLS Cipher Suites (https://stellastra.com/cipher-suite) - A list of TLS cipher suites and their security ratings. 
Tools
@@ -156,13 +157,13 @@
- Bcrypt (http://bcrypt.sourceforge.net/) - Cross-platform file encryption utility.
- blackbox (https://github.com/StackExchange/blackbox) - safely store secrets in Git/Mercurial/Subversion.
- certbot (https://github.com/certbot/certbot) - Previously the Let's Encrypt Client, is EFF's tool to obtain certs from Let's Encrypt, and (optionally) auto-enable HTTPS on your server. It can also act as a client for any other CA that
uses the ACME protocol.
- certbot (https://github.com/certbot/certbot) - Previously the Let's Encrypt Client, is EFF's tool to obtain certs from Let's Encrypt, and (optionally) auto-enable HTTPS on your server. It can also act as a client for any other CA that uses the 
ACME protocol.
- Coherence (https://github.com/liesware/coherence/) - Cryptographic server for modern web apps.
- cryptomator (https://github.com/cryptomator/cryptomator) - Multi-platform transparent client-side encryption of your files in the cloud.
- Databunker (https://databunker.org/) - API based personal data or PII storage service built to comply with GDPR and CCPA.
- gpg (https://www.gnupg.org/) - Complete and free implementation of the OpenPGP standard. It allows to encrypt and sign your data and communication, features a versatile key management system. GnuPG is a command line tool with features
for easy integration with other applications.
- gpg (https://www.gnupg.org/) - Complete and free implementation of the OpenPGP standard. It allows to encrypt and sign your data and communication, features a versatile key management system. GnuPG is a command line tool with features for easy 
integration with other applications.
- ironssh (https://github.com/IronCoreLabs/ironssh) - End-to-end encrypt transferred files using sftp/scp and selectively share with others. Automatic key management works with any SSH server. Encrypted files are gpg compatible.
- Nipe (https://github.com/GouveaHeitor/nipe) - Nipe is a script to make Tor Network your default gateway.
- sops (https://github.com/mozilla/sops) - sops is an editor of encrypted files that supports YAML, JSON and BINARY formats and encrypts with AWS KMS, GCP KMS, Azure Key Vault and PGP.
@@ -192,8 +193,8 @@
- milagro-crypto-c (https://github.com/apache/incubator-milagro-crypto-c) - Small, self-contained and fast open source crypto library. It supports RSA, ECDH, ECIES, ECDSA, AES-GCM, SHA2, SHA3 and Pairing-Based Cryptography.
- monocypher (https://monocypher.org) - small, portable, easy to use crypto library inspired by libsodium and TweetNaCl.
- NaCl (https://nacl.cr.yp.to/) - High-speed library for network communication, encryption, decryption, signatures, etc.
- nettle (https://github.com/gnutls/nettle) - is a cryptographic library that is designed to fit easily in more or less any context: In crypto toolkits for object-oriented languages (C++, Python, Pike, ...), in applications like LSH or 
GNUPG, or even in kernel space.
- nettle (https://github.com/gnutls/nettle) - is a cryptographic library that is designed to fit easily in more or less any context: In crypto toolkits for object-oriented languages (C++, Python, Pike, ...), in applications like LSH or GNUPG, or 
even in kernel space.
- OpenSSL (https://github.com/openssl/openssl) - TLS/SSL and crypto library.
- PolarSSL (https://tls.mbed.org/) - PolarSSL makes it trivially easy for developers to include cryptographic and SSL/TLS capabilities in their (embedded) products, facilitating this functionality with a minimal coding footprint.
- RHash (https://github.com/rhash/RHash) - Great utility for computing hash sums.
@@ -227,8 +228,8 @@
- buddy-core (https://funcool.github.io/buddy-core/latest/) - Cryptographic Api.
- clj-crypto (https://github.com/macourtney/clj-crypto/) - Wrapper for Bouncy Castle.
- pandect (https://github.com/xsc/pandect) - Fast and easy-to-use Message Digest, Checksum and HMAC library for Clojure.
- secrets.clj (https://github.com/lk-geimfari/secrets.clj) - A Clojure library designed to generate cryptographically strong random numbers suitable for managing data such as passwords, account authentication, security tokens, and 
related secrets.
- secrets.clj (https://github.com/lk-geimfari/secrets.clj) - A Clojure library designed to generate cryptographically strong random numbers suitable for managing data such as passwords, account authentication, security tokens, and related 
secrets.
Common Lisp
@@ -265,8 +266,8 @@
- crypto (https://golang.org/pkg/crypto/) - Official Website Resources.
- dkeyczar (https://github.com/dgryski/dkeyczar) - Port of Google's Keyczar cryptography library to Go.
- gocrypto (https://github.com/kisom/gocrypto) - Example source code for the Practical Crypto with Go book.
- goThemis (https://github.com/cossacklabs/themis/wiki/Go-Howto) - Go wrapper on Themis. High level crypto library for storing data (AES), secure messaging (ECC + ECDSA / RSA + PSS + PKCS#7) and session-oriented, forward secrecy data 
exchange (ECDH key agreement, ECC & AES encryption).
- goThemis (https://github.com/cossacklabs/themis/wiki/Go-Howto) - Go wrapper on Themis. High level crypto library for storing data (AES), secure messaging (ECC + ECDSA / RSA + PSS + PKCS#7) and session-oriented, forward secrecy data exchange 
(ECDH key agreement, ECC & AES encryption).
- kyber (https://github.com/dedis/kyber) - Advanced crypto library for the Go language.
@@ -300,17 +301,19 @@
- jsencrypt (https://github.com/travist/jsencrypt) - JavaScript library to perform OpenSSL RSA Encryption, Decryption, and Key Generation.
- JShashes (https://github.com/h2non/jshashes) - Fast and dependency-free cryptographic hashing library for Node.js and browsers (supports MD5, SHA1, SHA256, SHA512, RIPEMD, HMAC).
- jsrsasign (https://github.com/kjur/jsrsasign) - The 'jsrsasign' (RSA-Sign JavaScript Library) is an opensource free cryptography library supporting RSA/RSAPSS/ECDSA/DSA signing/validation.
- jsThemis (https://github.com/cossacklabs/themis/wiki/Nodejs-Howto) - JavaScript wrapper on Themis. High level crypto library for storing data (AES), secure messaging (ECC + ECDSA / RSA + PSS + PKCS#7) and session-oriented, forward 
secrecy data exchange (ECDH key agreement, ECC & AES encryption).
- jsThemis (https://github.com/cossacklabs/themis/wiki/Nodejs-Howto) - JavaScript wrapper on Themis. High level crypto library for storing data (AES), secure messaging (ECC + ECDSA / RSA + PSS + PKCS#7) and session-oriented, forward secrecy data 
exchange (ECDH key agreement, ECC & AES encryption).
- libsodium.js (https://github.com/jedisct1/libsodium.js) - libsodium compiled to pure JavaScript, with convenient wrappers.
- libVES.js (https://github.com/vesvault/libVES) - End-to-end encrypted sharing via cloud repository, secure recovery through a viral network of friends in case of key loss.
- milagro-crypto-js (https://github.com/apache/incubator-milagro-crypto-js) - MCJS is a standards compliant JavaScript cryptographic library with no external dependencies except for the random seed source. Compatible for Node.js and 
browser. It supports RSA, ECDH, ECIES, ECDSA, AES-GCM, SHA2, SHA3, Pairing-Based Cryptography and New Hope.
- micro-rsa-dsa-dh (https://github.com/paulmillr/micro-rsa-dsa-dh) - Minimal implementation of older cryptography algorithms: RSA, DSA, DH, ElGamal.
- milagro-crypto-js (https://github.com/apache/incubator-milagro-crypto-js) - MCJS is a standards compliant JavaScript cryptographic library with no external dependencies except for the random seed source. Compatible for Node.js and browser. It 
supports RSA, ECDH, ECIES, ECDSA, AES-GCM, SHA2, SHA3, Pairing-Based Cryptography and New Hope.
- noble - high-security, easily auditable set of contained cryptographic libraries and tools. Zero dependencies each.
 - noble-ciphers (https://github.com/paulmillr/noble-ciphers) — cryptographic ciphers, including AES-SIV, Salsa20, ChaCha, Poly1305 and FF1
 - noble-curves (https://github.com/paulmillr/noble-curves) — elliptic curve cryptography, including Weierstrass, Edwards, Montgomery curves, pairings, hash-to-curve, poseidon hash, schnorr, secp256k1, ed25519, ed448, p521, bn254, 
bls12-381 and others. Also 4kb noble-secp256k1 (https://github.com/paulmillr/noble-secp256k1), noble-ed25519 (https://github.com/paulmillr/noble-ed25519)
 - noble-hashes (https://github.com/paulmillr/noble-hashes) — SHA2, SHA3, RIPEMD, BLAKE2/3, HMAC, HKDF, PBKDF2 & Scrypt
 - noble-curves (https://github.com/paulmillr/noble-curves) — elliptic curve cryptography, including Weierstrass, Edwards, Montgomery curves, pairings, hash-to-curve, poseidon hash, schnorr, secp256k1, ed25519, ed448, p521, bn254, bls12-381 and 
others. Also 4kb noble-secp256k1 (https://github.com/paulmillr/noble-secp256k1), noble-ed25519 (https://github.com/paulmillr/noble-ed25519)
 - noble-hashes (https://github.com/paulmillr/noble-hashes) — SHA2, SHA3, RIPEMD, BLAKE2/3, HMAC, HKDF, PBKDF2, Scrypt & Argon2id
 - noble-post-quantum (https://github.com/paulmillr/noble-post-quantum) — ML-KEM, ML-DSA, SLH-DSA (CRYSTALS-Kyber, CRYSTALS-Dilithium, Sphincs+) and hybrids
- node.bcrypt.js (https://github.com/ncb000gt/node.bcrypt.js) - bcrypt for Node.js.
- OpenPGP.js (https://github.com/openpgpjs/openpgpjs) - OpenPGP implementation for JavaScript.
- PolyCrypt (https://github.com/polycrypt/polycrypt) - Pure JS implementation of the WebCrypto API.
@@ -327,8 +330,8 @@
- Flexiprovider (http://www.flexiprovider.de/) - Powerful toolkit for the Java Cryptography Architecture.
- GDH (https://github.com/maxamel/GDH) - Generalized Diffie-Hellman key exchange Java library for multiple parties built on top of the Vert.x framework.
- Google Tink (https://github.com/tink-crypto/tink-java) - A small crypto library that provides a safe, simple, agile and fast way to accomplish some common crypto tasks.
- Java Themis (https://github.com/cossacklabs/themis/wiki/Java-and-Android-Howto) - Java/Android wrapper on Themis. High level crypto library for storing data (AES), secure messaging (ECC + ECDSA / RSA + PSS + PKCS#7) and 
session-oriented, forward secrecy data exchange (ECDH key agreement, ECC & AES encryption).
- Java Themis (https://github.com/cossacklabs/themis/wiki/Java-and-Android-Howto) - Java/Android wrapper on Themis. High level crypto library for storing data (AES), secure messaging (ECC + ECDSA / RSA + PSS + PKCS#7) and session-oriented, 
forward secrecy data exchange (ECDH key agreement, ECC & AES encryption).
- jbcrypt (http://www.mindrot.org/projects/jBCrypt/) - jBCrypt is an implementation the OpenBSD Blowfish password hashing
algorithm.
- Keycloak (https://github.com/keycloak/keycloak) - Open Source Identity and Access Management For Modern Applications and Services.
@@ -361,8 +364,8 @@
Objective-C
- CocoaSecurity (https://github.com/kelp404/CocoaSecurity) - AES, MD5, SHA1, SHA224, SHA256, SHA384, SHA512, Base64, Hex.
- ObjC Themis (https://github.com/cossacklabs/themis/wiki/Objective-C-Howto) - ObjC wrapper on Themis for iOS and macOS. High level crypto library for storing data (AES), secure messaging (ECC + ECDSA / RSA + PSS + PKCS#7) and 
session-oriented, forward secrecy data exchange (ECDH key agreement, ECC & AES encryption).
- ObjC Themis (https://github.com/cossacklabs/themis/wiki/Objective-C-Howto) - ObjC wrapper on Themis for iOS and macOS. High level crypto library for storing data (AES), secure messaging (ECC + ECDSA / RSA + PSS + PKCS#7) and session-oriented, 
forward secrecy data exchange (ECDH key agreement, ECC & AES encryption).
- ObjectivePGP (https://github.com/krzyzanowskim/ObjectivePGP) - ObjectivePGP is an implementation of OpenPGP protocol for iOS and macOS. OpenPGP is the most widely used email encryption standard.
- RNCryptor (https://github.com/RNCryptor/RNCryptor) - CCCryptor (AES encryption) wrappers for iOS and Mac.
@@ -372,8 +375,8 @@
- halite (https://paragonie.com/project/halite) - Simple library for encryption using libsodium.
- libsodium-laravel (https://github.com/scrothers/libsodium-laravel) - Laravel Package Abstraction using libsodium.
- PHP Encryption (https://github.com/defuse/php-encryption) - Library for encrypting data with a key or password in PHP.
- PHP Themis (https://github.com/cossacklabs/themis/wiki/PHP-Howto) - PHP wrapper on Themis. High level crypto library for storing data (AES), secure messaging (ECC + ECDSA / RSA + PSS + PKCS#7) and session-oriented, forward secrecy 
data exchange (ECDH key agreement, ECC & AES encryption).
- PHP Themis (https://github.com/cossacklabs/themis/wiki/PHP-Howto) - PHP wrapper on Themis. High level crypto library for storing data (AES), secure messaging (ECC + ECDSA / RSA + PSS + PKCS#7) and session-oriented, forward secrecy data exchange
(ECDH key agreement, ECC & AES encryption).
- TCrypto (https://github.com/timoh6/TCrypto) - TCrypto is a simple and flexible PHP 5.3+ in-memory key-value storage library.
Python
@@ -391,8 +394,8 @@
- pycryptodome (https://github.com/Legrandin/pycryptodome) - Self-contained Python package of low-level cryptographic primitives.
- PyElliptic (https://github.com/yann2192/pyelliptic) - Python OpenSSL wrapper. For modern cryptography with ECC, AES, HMAC, Blowfish.
- pynacl (https://github.com/pyca/pynacl) - Python binding to the Networking and Cryptography (NaCl) library.
- pythemis (https://github.com/cossacklabs/themis/wiki/Python-Howto) - Python wrapper on Themis. High level crypto library for storing data (AES), secure messaging (ECC + ECDSA / RSA + PSS + PKCS#7) and session-oriented, forward secrecy
data exchange (ECDH key agreement, ECC & AES encryption).
- pythemis (https://github.com/cossacklabs/themis/wiki/Python-Howto) - Python wrapper on Themis. High level crypto library for storing data (AES), secure messaging (ECC + ECDSA / RSA + PSS + PKCS#7) and session-oriented, forward secrecy data 
exchange (ECDH key agreement, ECC & AES encryption).
R
@@ -402,26 +405,35 @@
- bcrypt-ruby (https://github.com/codahale/bcrypt-ruby) - Ruby binding for the OpenBSD bcrypt() password hashing algorithm, allowing you to easily store a secure hash of your users' passwords.
- RbNaCl (https://github.com/cryptosphere/rbnacl) - Ruby binding to the Networking and Cryptography (NaCl) library.
- Ruby Themis (https://github.com/cossacklabs/themis/wiki/Ruby-Howto) - Ruby wrapper on Themis. High level crypto library for storing data (AES), secure messaging (ECC + ECDSA / RSA + PSS + PKCS#7) and session-oriented, forward secrecy 
data exchange (ECDH key agreement, ECC & AES encryption).
- Ruby Themis (https://github.com/cossacklabs/themis/wiki/Ruby-Howto) - Ruby wrapper on Themis. High level crypto library for storing data (AES), secure messaging (ECC + ECDSA / RSA + PSS + PKCS#7) and session-oriented, forward secrecy data 
exchange (ECDH key agreement, ECC & AES encryption).
Rust
- AEADs (https://github.com/RustCrypto/AEADs) - Authenticated Encryption with Associated Data Algorithms: high-level encryption ciphers.
- BLAKE3 (https://github.com/BLAKE3-team/BLAKE3) - is official Rust and C implementations of the BLAKE3 cryptographic hash function.
- botan-rs (https://github.com/randombit/botan-rs) - Botan bindings for Rust.
- cryptoballot (https://github.com/cryptoballot/cryptoballot) - Cryptographically secure online voting.
- dalek cryptography (https://github.com/dalek-cryptography/) - Fast yet safe mid-level API for ECC, Bulletproofs, and more.
- dryoc (https://github.com/brndnmtthws/dryoc) - A pure-Rust, general purpose crypto library that implements libsodium primitives.
- elliptic-curves (https://github.com/RustCrypto/elliptic-curves) - Collection of pure Rust elliptic curve implementations: NIST P-224, P-256, P-384, P-521, secp256k1, SM2.
- formats (https://github.com/RustCrypto/formats) - Cryptography-related format encoders/decoders: DER, PEM, PKCS, PKIX.
- hashes (https://github.com/RustCrypto/hashes) - Collection of cryptographic hash functions written in pure Rust.
- mundane (https://github.com/google/mundane) - is a Rust cryptography library backed by BoringSSL that is difficult to misuse, ergonomic, and performant.
- ockam (https://github.com/ockam-network/ockam) - is a Rust library for end-to-end encryption and mutual authentication.
- octavo (https://github.com/libOctavo/octavo) - Highly modular & configurable hash & crypto library.
- orion (https://github.com/orion-rs/orion) - is a cryptography library written in pure Rust. It aims to provide easy and usable crypto while trying to minimize the use of unsafe code.
- password-hashes (https://github.com/RustCrypto/password-hashes) - Collection of password hashing algorithms, otherwise known as password-based key derivation functions, written in pure Rust.
- proteus (https://github.com/wireapp/proteus) - Axolotl protocol implementation, without header keys, in Rust.
- rage (https://github.com/str4d/rage) - is a simple, modern, and secure file encryption tool, using the age format.
- recrypt (https://github.com/IronCoreLabs/recrypt-rs) - A pure-Rust library that implements cryptographic primitives for building a multi-hop Proxy Re-encryption scheme, known as Transform Encryption.
- ring (https://github.com/briansmith/ring) - Safe, fast, small crypto using Rust & BoringSSL's cryptography primitives.
- ronkathon (https://github.com/pluto/ronkathon) - Educational, mathematically transparent, well documentated cryptography in rust.
- rust-crypto (https://github.com/DaGenix/rust-crypto) - Mostly pure-Rust implementation of various cryptographic algorithms.
- rust-openssl (https://github.com/sfackler/rust-openssl) - OpenSSL bindings for Rust.
- rustls (https://github.com/ctz/rustls) - Rustls is a new, modern TLS library written in Rust.
- signatures (https://github.com/RustCrypto/signatures) - Cryptographic signature algorithms: DSA, ECDSA, Ed25519.
- snow (https://github.com/mcginty/snow?tab=readme-ov-file) - Pure Rust implementation of Trevor Perrins Noise Protocol (https://noiseprotocol.org/noise.html).
- sodiumoxide (https://github.com/dnaq/sodiumoxide) - Sodium Oxide: Fast cryptographic library for Rust (bindings to libsodium).
- suruga (https://github.com/klutzy/suruga) - TLS 1.2 implementation in Rust.
- webpki (https://github.com/briansmith/webpki) - Web PKI TLS X.509 certificate validation in Rust.
@@ -448,8 +460,8 @@
- SweetHMAC (https://github.com/jancassio/SweetHMAC) - Tiny and easy to use Swift class to encrypt strings using HMAC algorithms.
- Swift-Sodium (https://github.com/jedisct1/swift-sodium) - Swift interface to the Sodium library for common crypto operations for iOS and macOS.
- SwiftSSL (https://github.com/SwiftP2P/SwiftSSL) - Elegant crypto toolkit in Swift.
- SwiftThemis (https://github.com/cossacklabs/themis/wiki/Swift-Howto) - Swift wrapper on Themis for iOS and macOS. High level crypto library for storing data (AES), secure messaging (ECC + ECDSA / RSA + PSS + PKCS#7) and 
session-oriented, forward secrecy data exchange (ECDH key agreement, ECC & AES encryption).
- SwiftThemis (https://github.com/cossacklabs/themis/wiki/Swift-Howto) - Swift wrapper on Themis for iOS and macOS. High level crypto library for storing data (AES), secure messaging (ECC + ECDSA / RSA + PSS + PKCS#7) and session-oriented, 
forward secrecy data exchange (ECDH key agreement, ECC & AES encryption).
Resources
@@ -483,16 +495,15 @@
- Cryptocurrencies Dashboard (https://dashboard.nbshare.io/apps/reddit/top-crypto-subreddits/) - A dashboard of most active cryptocurrencies discussed on Reddit.
- Cryptography Stackexchange (http://crypto.stackexchange.com/) - Cryptography Stack Exchange is a question and answer site for software developers, mathematicians and others interested in cryptography.
- Cryptohack (https://cryptohack.org/) - A platform with lots of interactive cryptography challenges, similar to Cryptopals.
- Cryptopals Crypto Challenges (http://cryptopals.com/) - A series of applied cryptography challenges, starting from very basic challenges, such as hex to base 64 challanges, and gradually increasing the difficulty up to abstract 
algebra.
- Cryptopals Crypto Challenges (http://cryptopals.com/) - A series of applied cryptography challenges, starting from very basic challenges, such as hex to base 64 challanges, and gradually increasing the difficulty up to abstract algebra.
- Eliptic Curve Calculator (https://paulmillr.com/noble/#demo) - simple form that allows to calculate elliptic curve public keys and signatures. Features include ability to create custom curves and different signature types
- Garykessler Crypto (http://www.garykessler.net/library/crypto.html) - An Overview of Cryptography.
- IACR (https://www.iacr.org/) - The International Association for Cryptologic Research is a non-profit scientific organization whose purpose is to further research in cryptology and related fields.
- Learn Cryptography (https://learncryptography.com/) - Dedicated to helping people understand how and why the cryptographic systems they use everyday without realizing work to secure and protect their privacy.
- Subreddit of Cryptography (https://www.reddit.com/r/cryptography/) - This subreddit is intended for links and discussions surrounding the theory and practice of strong cryptography.
- TikZ for Cryptographers (https://www.iacr.org/authors/tikz/) - A collection of block diagrams of common cryptographic functions drawn in TikZ to be used in research papers and presentations written in LaTeX.
- WebCryptoAPI (https://www.w3.org/TR/WebCryptoAPI/) - This specification describes a JavaScript API for performing basic cryptographic operations in web applications, such as hashing, signature generation and verification, and 
encryption and decryption.
- WebCryptoAPI (https://www.w3.org/TR/WebCryptoAPI/) - This specification describes a JavaScript API for performing basic cryptographic operations in web applications, such as hashing, signature generation and verification, and encryption and 
decryption.
Contributing
@@ -508,3 +519,5 @@
You should have received a copy of the CC0 legalcode along with this
work. If not, see https://creativecommons.org/publicdomain/zero/1.0/ (https://creativecommons.org/publicdomain/zero/1.0/).
cryptography Github: https://github.com/sobolevn/awesome-cryptography