Displaying 1 to 8 from 8 results

json-stable-stringify - deterministic JSON

You can also pass in a custom comparison function.Return a deterministic stringified string str from the object obj.

keychain-manager-js - A key system for hierarchical deterministic (HD / BIP32) keychains

A key system based around accounts that each have hierarchical deterministic (HD) keychains with ECDSA keypairs (the ones Bitcoin uses).A master private keychain is the highest level abstraction of keys. It represents the root or master private key for the application and/or device. Account-specific private keychains can be derived from it, which can then be used to derive account-specific public keychains.

sort-keys - Sort the keys of an object

Useful to get a deterministically ordered object, as the order of keys can vary between engines.Returns a new object with sorted keys.

gokey - A simple vaultless password manager in Go

gokey is a password manager, which does not require a password vault. Instead of storing your passwords in a vault it derives your password on the fly from your master password and supplied realm string (for example, resource URL). This way you do not have to manage, backup or sync your password vault (or trust its management to a third party) as your passwords are available immediately anywhere. The gokey binary should appear in your $GOPATH/bin directory.

caesar - An easy-to-use advanced cryptography library.

An easy-to-use advanced cryptography library that lets you focus on writing applications that process data, not encrypted data. A lot of security officials will tell web developers that if they need to type the letters 'AES' then they're doing cryptography wrong. However, they rarely offer any actual secure options to help their audience complete that totally awesome NSA-proof application they've had in mind for the last couple of weeks. Combine this with the recent "Secure, Decentralized, and Anonymous {Insert Word Here} for Everyone!" fetish, and there has been astonishing amount of cryptographic code written recently that is not only difficult to peer review, but often buried within an application's core instead of left somewhere conspicuous. While this newfound affinity for cryptography is fantastic, not every one of these developers will want to dedicate the time and effort required to build a secure product before slapping on the label "It uses cryptography!" Or, perhaps even more disconcertingly, not every one of these developers is aware of the true power of modern cryptography.

lwn-rtbp - Real-Time Linux Article Series for System Configuration and Application Development

Aid application developers in accomplishing common programming tasks in C and C++ (maybe) for Enterprise Real-Time Linux Applications. Discuss approaches to system configuration and tuning. Enumerate common pitfalls and how to avoid them. Use the kernel implementation details to educate developers on why they should adhere to these guidelines.