BLAKE3-team / BLAKE3-specsView external linksLinks
The BLAKE3 paper: specifications, analysis, and design rationale
☆187Jun 27, 2022Updated 3 years ago
Alternatives and similar repositories for BLAKE3-specs
Users that are interested in BLAKE3-specs are comparing it to the libraries listed below
Sorting:
- Deterministic/nonce-reuse resistant authenticated encryption scheme using XChaCha20, implemented on libsodium.☆30Aug 5, 2024Updated last year
- Intuitive Quantum Computation and Post-Quantum Cryptography☆63Sep 21, 2022Updated 3 years ago
- Proof-of-concept implementation of the (V)OPRF protocol in https://datatracker.ietf.org/doc/draft-irtf-cfrg-voprf/☆23Aug 24, 2020Updated 5 years ago
- the official Rust and C implementations of the BLAKE3 cryptographic hash function☆6,054Jan 8, 2026Updated last month
- Elliptic curves Rust reference implementation☆16Mar 10, 2024Updated last year
- Xoodyak, a lightweight and versatile cryptographic scheme implemented in Rust.☆30Apr 24, 2025Updated 9 months ago
- Implementation and simulations for the "Reducing Metadata Leakage from Encrypted Data and Communication with PURBs" paper☆31Oct 26, 2023Updated 2 years ago
- Zero-related bugs in 4 BLS libs & standard draft,"splitting zero" attacks, $35000 award☆17Aug 20, 2021Updated 4 years ago
- Blind RSA signatures for OpenSSL/BoringSSL.☆17Jan 31, 2026Updated 2 weeks ago
- Optimized Binary GCD for Modular Inversion☆52Oct 28, 2020Updated 5 years ago
- [RFC9380] Hash to curves - Rust reference implementation☆28Mar 10, 2024Updated last year
- An EXPERIMENTAL Go implementation of the CPace PAKE, instantiated with the ristretto255 group.☆29Feb 11, 2021Updated 5 years ago
- Generator and supporting evidence for security of the Tweedledum/Tweedledee pair of elliptic curves suitable for Halo☆20Oct 25, 2022Updated 3 years ago
- Bounds on divsteps iterations in safegcd☆57Sep 30, 2024Updated last year
- Crypto Audit Guidelines☆134Dec 28, 2020Updated 5 years ago
- Parses https://eprint.iacr.org/eprint-bin/search.pl?last=365&title=1 and sends you an email with the latest papers☆15Nov 11, 2020Updated 5 years ago
- A pure rust implementation of the gimli cipher☆13Jan 26, 2022Updated 4 years ago
- ☆12May 7, 2021Updated 4 years ago
- ☆19Jul 13, 2020Updated 5 years ago
- Reference implementations of post-quantum cryptographic primitives☆33Aug 27, 2025Updated 5 months ago
- Pointcheval Sanders signature☆27Jan 16, 2020Updated 6 years ago
- An AVX-512 accelerated implementation of the BLAKE3 cryptographic hash function☆411Aug 13, 2025Updated 6 months ago
- fft impl for ff::Field☆17May 9, 2024Updated last year
- AES-GEM (AES Galois Extended Mode) implementation.☆13Feb 9, 2026Updated last week
- Pong revolution.☆16Oct 26, 2025Updated 3 months ago
- Implementation of do255e and do255s in Go☆23Dec 14, 2020Updated 5 years ago
- ☆21Sep 6, 2020Updated 5 years ago
- Very fast cryptographic hashing for large messages.☆69Mar 11, 2025Updated 11 months ago
- Pure Go implementation of BLAKE3 with AVX2 and SSE4.1 acceleration☆462Apr 2, 2025Updated 10 months ago
- an authenticated, chunked cipher based on BLAKE3☆23May 7, 2025Updated 9 months ago
- Nearly generic prime field implementation in Go☆24Feb 11, 2020Updated 6 years ago
- Implementations of do255e and do255s in C and assembly☆25May 3, 2021Updated 4 years ago
- C crypto library☆24Aug 2, 2023Updated 2 years ago
- Curve ecGFp5☆69Mar 31, 2022Updated 3 years ago
- SageMath library for constructing elliptic curves☆74Jul 14, 2023Updated 2 years ago
- Pairing operations over the BLS12-381 elliptic curve in Haskell☆14Feb 18, 2022Updated 3 years ago
- A Zero-Knowledge Toolkit☆15Oct 15, 2020Updated 5 years ago
- Cryptographic Addition Chain Generation in Go☆195Jun 30, 2024Updated last year
- Verifying constant-time code with symbolic execution☆47Oct 26, 2021Updated 4 years ago