BjoernMHaase / AuCPace
☆11Updated 10 months ago
Related projects ⓘ
Alternatives and complementary repositories for AuCPace
- library providing OPRF and Threshold OPRF based on libsodium☆20Updated last month
- Script generated finite field arithmetic for elliptic curve cryptography☆17Updated last week
- ☆39Updated 3 years ago
- BAT KEM/Signature Reference Implementation☆19Updated 2 years ago
- Deterministic/nonce-reuse resistant authenticated encryption scheme using XChaCha20, implemented on libsodium.☆28Updated 3 months ago
- OPAQUE asymmetric PAKE, and its threshold implementation. Experimental, not audited.☆16Updated 3 years ago
- SQISign: Short Quaternion and Isogeny Signature – C implementation based on PARI/GP (obsolete implementation)☆27Updated last year
- Stronger and Faster Side-Channel Protections for CSIDH☆19Updated 3 years ago
- Banquet implementation☆13Updated 2 years ago
- Tools for power measurements of post-quantum cryptographic algorithms☆26Updated 4 years ago
- ☆32Updated 2 years ago
- Implementation and simulations for the "Reducing Metadata Leakage from Encrypted Data and Communication with PURBs" paper☆30Updated last year
- Oblivious Pseudorandom Functions (OPRFs) using Prime-Order Groups☆39Updated 2 months ago
- Experimental implementation of KEMTLS in Rustls☆27Updated last year
- Implementation of cryptographic primitives in Go☆12Updated last year
- [RFC9380] Hash to curves - Rust reference implementation☆24Updated 8 months ago
- Faster Montgomery and Joye ladder formulas for short Weierstrass elliptic curves☆19Updated 4 years ago
- Proof-of-concept implementation of the (V)OPRF protocol in https://datatracker.ietf.org/doc/draft-irtf-cfrg-voprf/☆23Updated 4 years ago
- Readable Implementation of Strobe in Go☆22Updated 2 years ago
- Tornado is a compiler producing masked bitsliced implementations proven secure in the bit/register probing model☆18Updated 3 years ago
- Python implementations of FIPS 203,204,205 + Local python access to NIST's ACVP-Server "Golden Reference" crypto code☆25Updated last week
- List of crackpot 'scientists' and 'thinkers'☆14Updated 3 months ago
- ☆81Updated 4 years ago
- A pure-Rust implementation of group operations on Ristretto and Curve25519☆28Updated 3 months ago
- Efficient Anonymous Tokens with Private Metadata Bit☆13Updated last year
- Exploration of NIST post-quantum signatures on-ramp candidates☆23Updated 2 weeks ago
- Passive-Swoosh: Practical Lattice-Based Non-Interactive Key Exchange☆25Updated 5 months ago
- OPAQUE protocol, a secure asymmetric password authenticated key exchange (aPAKE) that supports mutual authentication in a client-server s…☆74Updated 3 years ago