LoupVaillant / elligatorLinks
Mirror of a website on Elligator by Daniel J. Bernstein, Mike Hamburg, Anna Krasnova, and Tanja Lange
☆19Updated 10 months ago
Alternatives and similar repositories for elligator
Users that are interested in elligator are comparing it to the libraries listed below
Sorting:
- ☆27Updated last year
- simple Rust CLI tool to derive an age private key from passphrase☆40Updated last month
- Research and proof of concept to develop the next SecureDrop with end to end encryption.☆54Updated last week
- An Internet-Draft for the Balloon Key Derivation Function (BKDF), a memory-hard password hashing and password-based key derivation functi…☆11Updated 7 months ago
- Source Code Transparency☆11Updated 2 years ago
- Compress sets of integers efficiently☆23Updated 9 months ago
- Specifications for Privacy Proxy Implementations☆32Updated this week
- retrobob is a retro gaming emulator that runs directly on your browser. Super Nintendo, NES/Famicom, Gameboy and Gameboy Color are curren…☆11Updated last year
- A Zig implementation of EdDSA signatures with blind keys.☆17Updated 2 years ago
- A distributed hash table with unusually strong security properties☆65Updated 6 years ago
- Signcryption using libsodium.☆68Updated last month
- A cache hard password hash/KDF☆49Updated last year
- ☆12Updated last year
- The AEGIS-128X and AEGIS-256X high performance ciphers.☆38Updated last year
- BAT KEM/Signature Reference Implementation☆23Updated 4 years ago
- SHA256 sentence: discover a SHA256 checksum that matches a sentence's description of hex digit words.☆21Updated 9 months ago
- I-D that describes the algorithm identifiers for NIST's PQC ML-DSA for use in the Internet X.509 Public Key Infrastructure☆14Updated 3 months ago
- VDAF specification☆25Updated last week
- Privacy Pass implementation in Rust☆57Updated last week
- A tiny, portable implementation of the IPCrypt specification in C.☆32Updated last week
- Block Erasure Format - An extensible, fast, and usable file utility to encode and decode interleaved erasure coded streams of data.☆58Updated last year
- Deterministic/nonce-reuse resistant authenticated encryption scheme using XChaCha20, implemented on libsodium.☆30Updated last year
- Community Cryptography Test Vectors☆97Updated last month
- Specification for the AEGIS family of authenticated encryption algorithms.☆21Updated last month
- PUREE: Password-based Uniform-Random-Equivalent Encryption☆64Updated 5 years ago
- ☆30Updated last week
- data-at-rest updatable threshold encryption KMS server and client☆22Updated 2 weeks ago
- Password store and secret manager using age encryption. This is my attempt to replace passwordstore's use of PGP, with age encryption. …☆15Updated 4 years ago
- A deterministic ed25519 key generator for SSH☆35Updated 4 years ago
- Configurator provides a GUI interface for your application, dynamically generated from a JSON file.☆17Updated last year