Showing 11 of total 11 results (show query)
piarasfahey
cryptography:Encrypts and Decrypts Text Ciphers
Playfair, Four-Square, Scytale, Columnar Transposition and Autokey methods. Further explanation on methods of classical cryptography can be found at Wikipedia; (<https://en.wikipedia.org/wiki/Classical_cipher>).
Maintained by Piaras Fahey. Last updated 2 years ago.
55.5 match 2 stars 4.00 score 3 scriptsropensci
sodium:A Modern and Easy-to-Use Crypto Library
Bindings to 'libsodium' <https://doc.libsodium.org/>: a modern, easy-to-use software library for encryption, decryption, signatures, password hashing and more. Sodium uses curve25519, a state-of-the-art Diffie-Hellman function by Daniel Bernstein, which has become very popular after it was discovered that the NSA had backdoored Dual EC DRBG.
Maintained by Jeroen Ooms. Last updated 3 months ago.
3.8 match 70 stars 12.43 score 175 scripts 103 dependentspaws-r
paws:Amazon Web Services Software Development Kit
Interface to Amazon Web Services <https://aws.amazon.com>, including storage, database, and compute services, such as 'Simple Storage Service' ('S3'), 'DynamoDB' 'NoSQL' database, and 'Lambda' functions-as-a-service.
Maintained by Dyfan Jones. Last updated 4 days ago.
3.8 match 332 stars 11.25 score 177 scripts 12 dependentspaws-r
paws.cost.management:'Amazon Web Services' Cost Management Services
Interface to 'Amazon Web Services' cost management services, including cost and usage reports, budgets, pricing, and more <https://aws.amazon.com/>.
Maintained by Dyfan Jones. Last updated 4 days ago.
3.8 match 332 stars 9.02 score 13 dependentsadelmofilho
tenispolaR:Provides ZENIT-POLAR Substitution Cipher Method of Encryption
Implementation of ZENIT-POLAR substitution cipher method of encryption using by default the TENIS-POLAR cipher. This last cipher of encryption became famous through the collection of Brazilian books "Os Karas" by the author Pedro Bandeira. For more details, see "A Cryptographic Dictionary" (GC&CS, 1944).
Maintained by Adelmo Filho. Last updated 6 years ago.
10.0 match 2.70 score 3 scriptscoolbutuseless
rmonocypher:Easy Encryption of R Objects using Strong Modern Cryptography
Encrypt R objects to a raw vector or file using modern cryptographic techniques. Password-based key derivation is with 'Argon2' (<https://en.wikipedia.org/wiki/Argon2>). Objects are serialized and then encrypted using 'XChaCha20-Poly1305' (<https://en.wikipedia.org/wiki/ChaCha20-Poly1305>) which follows RFC 8439 for authenticated encryption (<https://en.wikipedia.org/wiki/Authenticated_encryption>). Cryptographic functions are provided by the included 'monocypher' 'C' library (<https://monocypher.org>).
Maintained by Mike Cheng. Last updated 1 months ago.
2.8 match 17 stars 6.25 score 4 scriptsluigi-annic
ciphertext:Classical Cryptography Methods for Words and Phrases
Classical cryptography methods for words and brief phrases. Substitution, transposition and concealment (null) ciphers are available, like Caesar, Vigenère, Atbash, affine, simple substitution, Playfair, rail fence, Scytale, single column, bifid, trifid, and Polybius ciphers.
Maintained by Luigi Annicchiarico. Last updated 2 months ago.
3.5 match 3.30 score 1 scriptsgaborcsardi
secret:Share Sensitive Information in R Packages
Allow sharing sensitive information, for example passwords, 'API' keys, etc., in R packages, using public key cryptography.
Maintained by Gábor Csárdi. Last updated 5 years ago.
0.5 match 103 stars 6.31 score 50 scriptsguslipkin
cipheR:Encryption and Decryption with Text Ciphers
Encrypts and decrypts using basic ciphers. None of these should be used in place of real encryption using state of the art tools. The ciphers included use methods described in the ciphers's Wikipedia and cryptography hobby websites.
Maintained by Gus Lipkin. Last updated 2 years ago.
0.5 match 1 stars 2.70 score 5 scriptsrapporteket
sship:Tool for Secure Shipment of Content
Convenient tools for exchanging files securely from within R. By encrypting the content safe passage of files (shipment) can be provided by common but insecure carriers such as ftp and email. Based on asymmetric cryptography no management of shared secrets is needed to make a secure shipment as long as authentic public keys are available. Public keys used for secure shipments may also be obtained from external providers as part of the overall process. Transportation of files will require that relevant services such as ftp and email servers are available.
Maintained by Are Edvardsen. Last updated 2 years ago.
decryptionencryptionfile-transferopensslsftp
0.5 match 1 stars 2.70 score 4 scripts