Skip to main content

Implementation of tropical cryptographic protocols and attacks.

Project description

tropicpy

Welcome to tropicpy repository!

How to use?

If you wish to use protocols and attacks implemented in tropicpy follow those steps:

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

tropicpy-0.0.2.tar.gz (22.1 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

tropicpy-0.0.2-py3-none-any.whl (25.3 kB view details)

Uploaded Python 3

File details

Details for the file tropicpy-0.0.2.tar.gz.

File metadata

  • Download URL: tropicpy-0.0.2.tar.gz
  • Upload date:
  • Size: 22.1 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/4.0.2 CPython/3.8.8

File hashes

Hashes for tropicpy-0.0.2.tar.gz
Algorithm Hash digest
SHA256 eb87a4297c4df72224bb38b011463001af36ae5ce5b4e8c828afc2920fd8c1f8
MD5 3f50b5200f6e426f9b15dda9c24e512e
BLAKE2b-256 e2e13fc93ffb877e29e10d2ec1179be34d6c3f26b1258acec8bca3769dd3f887

See more details on using hashes here.

File details

Details for the file tropicpy-0.0.2-py3-none-any.whl.

File metadata

  • Download URL: tropicpy-0.0.2-py3-none-any.whl
  • Upload date:
  • Size: 25.3 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/4.0.2 CPython/3.8.8

File hashes

Hashes for tropicpy-0.0.2-py3-none-any.whl
Algorithm Hash digest
SHA256 e19c06461d0177f239518ec31cfcda6adf7ea3f32c9b4acc0be0bb3cb16816cd
MD5 2ba7a2af20a9f10bf6a5bae339d6a4ee
BLAKE2b-256 d6d4b360d1e6615b0fde6a46cc9993b49f6441c9aca65e3c22c37a33f7b0f0d5

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page