Azure-Samples / DoubleKeyEncryptionService
Download, install, and set up the Double Key Encryption service for Microsoft 365.
☆15Updated last month
Alternatives and similar repositories for DoubleKeyEncryptionService:
Users that are interested in DoubleKeyEncryptionService are comparing it to the libraries listed below
- ☆9Updated 2 years ago
- Faster Montgomery and Joye ladder formulas for short Weierstrass elliptic curves☆19Updated 4 years ago
- Zero-related bugs in 4 BLS libs & standard draft,"splitting zero" attacks, $35000 award☆17Updated 3 years ago
- The secure messaging summit information☆20Updated 4 years ago
- Repo for the implementation of the isogeny based signature scheme CSI-FiSh☆23Updated last year
- SQISign: Short Quaternion and Isogeny Signature – C implementation based on PARI/GP (obsolete implementation)☆27Updated 2 years ago
- Embedded curve over the Ristretto255 scalar field, for use in Bulletproofs☆17Updated 5 years ago
- Fast 4 way vectorized ladder for the complete set of Montgomery curves☆10Updated 6 years ago
- ☆18Updated last year
- Ascon-Based Lightweight Cryptography Primitives for Constrained Devices: Authenticated Encryption, Hash, and Extendable Output Functions☆16Updated last month
- Stronger and Faster Side-Channel Protections for CSIDH☆19Updated 4 years ago
- Asynchronous delegated key generation without shared secrets (DRAFT)☆65Updated last year
- ☆40Updated 3 years ago
- Wycheproof for Rust☆18Updated 6 months ago
- Slides from talks and other materials related to post-quantum crypto☆12Updated 4 years ago
- The vOW4SIKE project provides C code that implements the parallel collision search algorithm by van Oorschot and Wiener (vOW). The algori…☆12Updated 3 years ago
- Implementation of the Fish and Begol signature schemes☆13Updated 7 years ago
- OPAQUE asymmetric PAKE, and its threshold implementation. Experimental, not audited.☆16Updated 3 years ago
- Efficient Anonymous Tokens with Private Metadata Bit☆14Updated last year
- Formal Analysis of the PQXDH Protocol☆25Updated 8 months ago
- An implementation of the Groth-Sahai NIZK protocol☆14Updated 8 years ago
- Software optimized implementations of GIFT and GIFT-COFB☆18Updated 2 years ago
- Around applying the VDF construcrtion based on isogenies between super-signular elliptic curves☆15Updated 3 years ago
- library providing OPRF and Threshold OPRF based on libsodium☆22Updated this week
- ☆12Updated 5 years ago
- lattice-based digital signature scheme qTESLA☆32Updated 5 years ago
- ☆12Updated 3 years ago
- Algorand's reference implementation of bls signature scheme☆13Updated 4 years ago
- FrodoKEM: Learning with Errors Key Encapsulation. FrodoKEM is a family of key-encapsulation mechanisms that are designed to be conservati…☆129Updated 3 months ago
- Crypto and TLS for C++11☆34Updated this week