LoupVaillant / elligatorLinks
Mirror of a website on Elligator by Daniel J. Bernstein, Mike Hamburg, Anna Krasnova, and Tanja Lange
☆17Updated 4 months ago
Alternatives and similar repositories for elligator
Users that are interested in elligator are comparing it to the libraries listed below
Sorting:
- ☆24Updated last year
- Research and proof of concept to develop the next SecureDrop with end to end encryption.☆49Updated last week
- Source Code Transparency☆11Updated last year
- Signcryption using libsodium.☆66Updated last year
- A cache hard password hash/KDF☆47Updated last year
- Deterministic/nonce-reuse resistant authenticated encryption scheme using XChaCha20, implemented on libsodium.☆30Updated last year
- PUREE: Password-based Uniform-Random-Equivalent Encryption☆63Updated 5 years ago
- Bertie TLS 1.3 Implementation☆124Updated 2 months ago
- A distributed hash table with unusually strong security properties☆64Updated 5 years ago
- Compress sets of integers efficiently☆22Updated 4 months ago
- Coordination of implementation and interop specific details☆122Updated 4 months ago
- simple Rust CLI tool to derive an age private key from passphrase☆39Updated last year
- Oblivious HTTP implementation☆31Updated last year
- An Internet-Draft for the Balloon Key Derivation Function (BKDF), a memory-hard password hashing and password-based key derivation functi…☆11Updated last month
- VDAF specification☆23Updated this week
- ☆82Updated 5 years ago
- ☆12Updated 7 months ago
- Community Cryptography Test Vectors☆82Updated 3 months ago
- BAT KEM/Signature Reference Implementation☆22Updated 3 years ago
- A deterministic ed25519 key generator for SSH☆33Updated 3 years ago
- Traffic analysis resistant messaging with Gio based user interface☆17Updated last month
- The AEGIS-128X and AEGIS-256X high performance ciphers.☆37Updated 8 months ago
- Specifications for Privacy Proxy Implementations☆31Updated this week
- A Zig implementation of EdDSA signatures with blind keys.☆17Updated 2 years ago
- Password store and secret manager using age encryption. This is my attempt to replace passwordstore's use of PGP, with age encryption. …☆15Updated 3 years ago
- Balloon Hashing implemented in Python☆15Updated last week
- OPAQUE protocol, a secure asymmetric password authenticated key exchange (aPAKE) that supports mutual authentication in a client-server s…☆79Updated 4 years ago
- AES-GEM (AES Galois Extended Mode) implementation.☆13Updated 5 months ago
- A golang implementation of Ed448-Goldilocks. This is a mirror of https://bugs.otr.im/otrv4/ed448☆40Updated 2 years ago
- Configurator provides a GUI interface for your application, dynamically generated from a JSON file.☆17Updated last year