Skip to content
#

asymmetric-cryptography

Here are 154 public repositories matching this topic...

Shows in a simple way how the sender and receiver function of Alice and Bob works in encrypted form. The ECDiffieHellman (ec key exchange) and ECDSA (ec digital signing) algorithms are used here. The elliptic curves are always selected randomly so that everything in the temporary area is used. Was slightly adapted in 2024 and updated to DotNet8.

  • Updated Apr 30, 2024
  • C#

Tanji is a Python encryption library that provides a secure and flexible solution for encrypting and decrypting messages. It leverages both symmetric and asymmetric encryption techniques to ensure the confidentiality and integrity of your data.

  • Updated Mar 19, 2024
  • HTML

Complete and working ASP.NET Core Web APIs template with lot of examples: OAuth 2.0 Authentication, JSON Web Algorithms and Bearer Tokens (JWA, JWT, JWS, JWE), HMAC symmetric key, RSA X509 certificate asymmetric key, AES encryption, CQRS, DDD, MediatR, Dapper, Docker, Entity Framework, Fluent Validation, GZip, Hangfire, NLog, REST CRUD, Swagger...

  • Updated Feb 1, 2024
  • C#

Improve this page

Add a description, image, and links to the asymmetric-cryptography topic page so that developers can more easily learn about it.

Curate this topic

Add this topic to your repo

To associate your repository with the asymmetric-cryptography topic, visit your repo's landing page and select "manage topics."

Learn more