Skip to main content

Implementation of tropical cryptographic protocols and attacks.

Project description

tropicpy

Welcome to tropicpy repository!

How to use?

If you wish to use protocols and attacks implemented in tropicpy follow those steps:

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

tropicpy-0.0.3.tar.gz (22.2 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

tropicpy-0.0.3-py3-none-any.whl (25.6 kB view details)

Uploaded Python 3

File details

Details for the file tropicpy-0.0.3.tar.gz.

File metadata

  • Download URL: tropicpy-0.0.3.tar.gz
  • Upload date:
  • Size: 22.2 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/4.0.2 CPython/3.8.8

File hashes

Hashes for tropicpy-0.0.3.tar.gz
Algorithm Hash digest
SHA256 cfce16ceda598039e019ed9621d2fdefcc558a7855e29824d47db5b4e7281f42
MD5 954ae0a14a0bd3ae788501707406653a
BLAKE2b-256 83c27b0ce15c61c917d9d66e01561e0654708f263abeb49843a79c9a50357678

See more details on using hashes here.

File details

Details for the file tropicpy-0.0.3-py3-none-any.whl.

File metadata

  • Download URL: tropicpy-0.0.3-py3-none-any.whl
  • Upload date:
  • Size: 25.6 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/4.0.2 CPython/3.8.8

File hashes

Hashes for tropicpy-0.0.3-py3-none-any.whl
Algorithm Hash digest
SHA256 677d3359a56d5867e2e96ea05ad68509d17b6d275ccb61329fe64d92400a4ad3
MD5 c03a855ca82b635d14840f6cf2fb9d7b
BLAKE2b-256 618520807fd74c4965bf19e8b5ba03ee659cf78dcac0589e1ccbb6b96b840ca3

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page