Skip to content
#

asymmetric-cryptography

Here are 11 public repositories matching this topic...

Shows in a simple way how the sender and receiver function of Alice and Bob works in encrypted form. The ECDiffieHellman (ec key exchange) and ECDSA (ec digital signing) algorithms are used here. The elliptic curves are always selected randomly so that everything in the temporary area is used. Was slightly adapted in 2024 and updated to DotNet8.

  • Updated Apr 30, 2024
  • C#

👑 🏆 💰 This code provides the basic steps required to locally verify an ID Token signed using asymmetric encryption (eg. RS256). It uses packages from Microsoft for key parsing and token validation. The code is also testable and comes with a suite of unit tests.

  • Updated Feb 7, 2019
  • C#

Complete and working ASP.NET Core Web APIs template with lot of examples: OAuth 2.0 Authentication, JSON Web Algorithms and Bearer Tokens (JWA, JWT, JWS, JWE), HMAC symmetric key, RSA X509 certificate asymmetric key, AES encryption, CQRS, DDD, MediatR, Dapper, Docker, Entity Framework, Fluent Validation, GZip, Hangfire, NLog, REST CRUD, Swagger...

  • Updated Feb 1, 2024
  • C#

Improve this page

Add a description, image, and links to the asymmetric-cryptography topic page so that developers can more easily learn about it.

Curate this topic

Add this topic to your repo

To associate your repository with the asymmetric-cryptography topic, visit your repo's landing page and select "manage topics."

Learn more