A schema that adds authentication to Identity Based Encryption (IBE). Claims advantages are adding authenticity and confidentiality to every message, simplifies key management and end-to-end security
Milagro is an open source, pairing-based cryptographic platform that delivers solutions for device and end user authentication, secure communications and fintech / blockchain security. It does this wi
A set of Java APIs to perform cryptography on Android. It was designed to be able to encrypt large files on disk in a fast and memory efficient manner. Ideal for older Android versions with lower memo
Open source sharing of mouse and keyboard among multiple computers. A software KBM, the pro version offers SSL and SSH encryption over the network. Features ability to drag and drop files between comp
A Tor client implementation and library written in pure Java. It was written from the Tor specification documents. It runs on Java 5+ and the Android devices.
A cryptographic engine purpose built for resource-constrained embedded systems environments. Features support for over 35 operating systems, cryptographic methods including RSA and elliptic curve, sym
An authentication protocol allowing users to access sites, prove ownership and manage their identity across many sites and devices without using a password.
This library contains a cryptographic pseudo-random number generator, cryptographic hash and message authentication code (MAC) functions, can perform symmetric-key authenticated data encryption, and g
A POSIX-compliant enterprise cryptographic stacked filesystem for Linux. It stores cryptographic metadata in the header of each file, so that encrypted files can be copied between hosts; the file will