GDH
Key exchange library
A Java library implementing a generalized Diffie-Hellman key exchange protocol for multiple parties
Generalized Diffie-Hellman key exchange Java library built on top of the Vert.x framework
32 stars
5 watching
5 forks
Language: Java
last commit: about 5 years ago
Linked from 2 awesome lists
Related projects:
Repository | Description | Stars |
---|---|---|
schollz/pake | A library for secure password-authenticated key exchange over insecure channels using elliptic curve cryptography. | 210 |
edwingeng/doublejump | A consistent hash implementation with improved node removal functionality | 102 |
ndmitchell/uniplate | A simple and efficient generics library for Haskell | 76 |
dalek-cryptography/x25519-dalek | An implementation of elliptic curve Diffie-Hellman key exchange using the x25519 curve | 331 |
kalimehtar/gls | A Racket-based library providing multiple dispatch with support for type and class predicates. | 17 |
jdconley/argon2themax | Library that optimizes password hashing with the Argon2 algorithm | 20 |
gamemakerdiscord/map.gml | A set of hashtable implementations optimized for use in GameMaker Studio 2.3+, providing varying levels of functionality and performance. | 2 |
c0r0n3r/dheater | An implementation of a proof-of-concept attack exploiting a vulnerability in Diffie-Hellman key exchange for denial-of-service | 186 |
maximilianheidenreich/dsddb | A lightweight key-value storage solution with simple API and support for primitive and custom data structures | 13 |
ndmitchell/extra | A collection of utility functions for the Haskell programming language | 94 |
ndmitchell/cmdargs | A Haskell library for building command line applications with minimal code | 91 |
gmetais/sw-delta | An incremental caching system for web applications using Service Workers | 1,101 |
mpurland/swiftmd5 | An implementation of the MD5 hashing algorithm in Swift. | 12 |
ndmitchell/hoogle | A search engine for Haskell APIs | 752 |
bogdan-kulynych/libshe | An encryption library allowing secure execution of functions on encrypted data without decrypting it | 27 |