Showing 20 open source projects for "shamir secret sharing"

View related business solutions
  • Never Get Blocked Again | Enterprise Web Scraping Icon
    Never Get Blocked Again | Enterprise Web Scraping

    Enterprise-Grade Proxies • Built-in IP Rotation • 195 Countries • 20K+ Companies Trust Us

    Get unrestricted access to public web data with our ethically-sourced proxy network. Automated session management and advanced unblocking handle the hard parts. Scale from 1 to 1M requests with zero blocks. Built for developers with ready-to-use APIs, serverless functions, and complete documentation. Used by 20,000+ companies including Fortune 500s. SOC2 and GDPR compliant.
    Get Started
  • Secure remote access solution to your private network, in the cloud or on-prem. Icon
    Secure remote access solution to your private network, in the cloud or on-prem.

    Deliver secure remote access with OpenVPN.

    OpenVPN is here to bring simple, flexible, and cost-effective secure remote access to companies of all sizes, regardless of where their resources are located.
    Get started — no credit card required.
  • 1
    SimpleX

    SimpleX

    The first messaging platform operating without user identifiers

    Other apps have user IDs: Signal, Matrix, Session, Briar, Jami, Cwtch, etc. SimpleX does not, not even random numbers. This radically improves your privacy. The video shows how you connect to your friend via their 1-time QR-code, in person or via a video link. You can also connect by sharing an invitation link. Temporary anonymous pairwise identifiers SimpleX uses temporary anonymous pairwise addresses and credentials for each user contact or group member. It allows to deliver messages without...
    Downloads: 8 This Week
    Last Update:
    See Project
  • 2
    Modern Errors

    Modern Errors

    Handle errors in a simple, stable, consistent way

    Handle errors in a simple, stable, consistent way. Exporting and documenting all error classes allows consumers to check them. This also enables sharing error classes between modules. Error properties that are internal or secret can be prefixed. This makes them non-enumerable, which prevents iterating or logging them.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    transfer.sh

    transfer.sh

    Easy and fast file sharing from the command-line

    Easy and fast file sharing from the command-line. This code contains the server with everything you need to create your own instance. Transfer.sh currently supports the s3 (Amazon S3), gdrive (Google Drive), storj (Storj) providers, and local file system (local). For easy deployment, we've created a Docker container. For the usage with a AWS S3 Bucket, you just need to specify the following options, provider, aws-access-key, aws-secret-key, bucket, and s3-region. If you specify the s3-region...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Diffuse

    Diffuse

    A music player that connects to your cloud/distributed storage

    ... may need HTTPS for it to work smoothly in certain browsers. I should also note that some source services use OAuth, so you'll need to use your own application credentials (eg. Google Drive client ID + secret).
    Downloads: 0 This Week
    Last Update:
    See Project
  • Auth0 Free: 25K MAUs + 5-Min Setup Icon
    Auth0 Free: 25K MAUs + 5-Min Setup

    Enterprise Auth, Zero Friction: Any Framework • 30+ SDKs • Universal Login

    Production-ready login in 10 lines of code. SSO, MFA & social auth included. Scale seamlessly beyond free tier with Okta’s enterprise security.
    Get Your API Keys
  • 5
    Cookiecutter Data Science

    Cookiecutter Data Science

    Project structure for doing and sharing data science work

    A logical, reasonably standardized, but flexible project structure for doing and sharing data science work. When we think about data analysis, we often think just about the resulting reports, insights, or visualizations. While these end products are generally the main event, it's easy to focus on making the products look nice and ignore the quality of the code that generates them. Because these end products are created programmatically, code quality is still important! And we're not talking...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    Inbucket

    Inbucket

    Disposable webmail server (similar to Mailinator) with built in SMTP

    Inbucket is an email testing application; it will accept messages from any email address and make them available to view via a web interface. When you need to test your webapp's outbound emails with Mailinator but are stuck behind a firewall, Inbucket provides the solution. It allows you to keep your new application development secret until it's time to release it. Inbucket is ideal for validating that emails go out as part of your integration test suite, sending links to coworkers...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    RistaScientificCalculator

    RistaScientificCalculator

    Rista Scientific Calculator is a app calculator and converter

    Privacy of Rista Scientific Calculator is a free windows offline app. It has no scope of sharing and collecting any personal / intuitional information. It never asks for any personal data or private secret information either in online or offline mode. It has no scope for any social, regional , political, medical, sexual and student harming. It has not any scope to promote personal, financial or advertisement . rscalcsetup is a vb.net app of scientific calculator and converter...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 8
    BIP39-XOR

    BIP39-XOR

    Encrypt or decrypt 12, 15, 18, 21 or 24 BIP39 codewords array ("seed")

    Encrypt or decrypt 12, 15, 18, 21 or 24 BIP39 codewords array (so-called "seed phrase") using exclusive OR (XOR)/Vernam cipher (a.k.a. One Time Pad). If not input by a user, an encryption key is automatically generated at random. Encryption with such a key preserves integrity of BIP-39 checksums of all keys (that's distinct while also compatible with SeedXOR implementation).
    Downloads: 1 This Week
    Last Update:
    See Project
  • 9
    Cnry

    Cnry

    Cnry makes it easy to publish and keep track of warrant canaries

    Cnry makes it easy to publish and keep track of warrant canaries. A warrant canary is a method by which a service provider can inform users that they've been served with a government subpoena despite legal prohibitions on revealing the existence of the subpoena. The idea of using negative pronouncements to thwart the nondisclosure requirements of court orders and served secret warrants was first proposed by Steven Schear on the cypherpunks mailing list. Even if you don't need a warrant canary...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Free CRM Software With Something for Everyone Icon
    Free CRM Software With Something for Everyone

    216,000+ customers in over 135 countries grow their businesses with HubSpot

    Think CRM software is just about contact management? Think again. HubSpot CRM has free tools for everyone on your team, and it’s 100% free. Here’s how our free CRM solution makes your job easier.
    Get free CRM
  • 10
    Lepton

    Lepton

    A lean snippet manager

    Lepton is a beautiful open source snippet manager for ubuntu. Manage your Github gists with support for tags, search and sharing. Lepton features a rich-text editor and markdown viewer. Try the snap today! Lepton's can be customized by <home_dir>/.leptonrc! Theme (light/dark), Snippet, Editor, Logger, Proxy, Shortcuts, Enterprise, Notifications, and more! Check out the configuration docs to explore different customization options. Lepton is an open source project on GitHub. It's free and we...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    IPFS Publish

    IPFS Publish

    Continuous Delivery of static websites to IPFS

    This is a tool that aims to enable the automatic publishing of static webpages from Git repositories into IPFS. It consists of two parts: a small web server and management CLI. Web server exposes an endpoint that you use as your Git's webhook. When the hook is invoked, it clones your repo, build it (if needed), add it to the IPFS node (pin it if configured) and publish the new IPFS address under configured IPNS name.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12

    ShaSeSha

    Implementations of Shamir's Secret Sharing algorithm

    Javascript, Python, C++ implementations of Shamir's Secret Sharing algorithm. This is very much a work in progress, and while the functionality is there to split and join, it needs work, cleanup, documentation, profiling and testing. It is only provided in the hopes it may be useful. I make absolutely NO guarantees or warranties, not even of merchantability, either expressed or implied, and do not make any claims about the security or reliability of this project. I do not authorize it's...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13

    lecithine

    FUSE File system powered by secret sharing scheme

    Lecithine is a FUSE (file system in user space) using a secret sharing scheme. You can use Lecithine as regular file system. When writing to disk, data will be devided into randomly chosen pieces (secret shares) and stored into different places. Upon reading, the shares are merged together such that in turn the plaintext results. From a cryptographers point of view, there is no symmetric or private key ever needed to produce a ciphertext. This is how secret sharing schemes are designed.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Java implementation of Shamir's Secret Sharing algorithm as described in Applied Cryptography [as LaGrange Interpolating Polynomial Scheme].
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Shamir's Secret Sharing Scheme
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    ESOSI (Employment of Secret-Sharing for Object Security in Intranets) offers a security solution for companies and authorities. It extends the eCryptfs file encryption system by adding Secret-Sharing, smartcard support and a Linux Security Module (LSM).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Secret Sharp is a wizard based GUI for the Shamir Secret Sharing Algorithm provided by the crypto++ API. Secret Sharp replicates the functionality that 'ssss' provides on unix.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    Real-Time Proactive Secret Sharing Library for RTAI is an implementation of the Shamir's secret sharing scheme and Herzberg's proactive secret sharing algorithm. The library uses a port of GNU GMP in order to make multiple precision arithmetic operatio
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    A PHP base webtools, let you share Informations and files to your friends from your gmail account, keep your gmail password secret. Simple setup , easy manage category by rename the labels by adding a prefix to become share folder.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20

    Simple Encrypt

    Simple Encrypt combines RSA encryption with AES to encrypt text files.

    RSA (Rivest-Shamir-Adleman) is a public-key encryption algorithm with a typical key size of 1,024 to 4,096 bits. 2 large primes are required to generate the keys. AES (Advanced Encryption Standard) is based on Rijndael, secret-key encryption algorithm using a block cipher with key sizes of 128, 192, or 256 bits. Simple Encrypt will take a text file, generate keys and then encrypt it. The output is the ciphertext and keys. Note: Realistically, I will keep the algorithms simple(r...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next