Roasbeef / perm-crypt
A Golang implementation of the AES-FFX Format-Preserving Encryption Scheme
☆10Updated 10 years ago
Alternatives and similar repositories for perm-crypt:
Users that are interested in perm-crypt are comparing it to the libraries listed below
- Package fourq implements FourQ, a high-speed elliptic curve at the 128-bit security level.☆55Updated 6 months ago
- An implementation of the OPAQUE password-authenticated key exchange protocol☆10Updated 5 months ago
- Implements ristretto255, a fast prime-order group.☆98Updated 3 years ago
- ☆60Updated 7 years ago
- ☆18Updated last year
- ☆19Updated 2 years ago
- go library for CBOR Object Signing and Encryption (COSE)☆40Updated 2 years ago
- C++ Implementation of Multivariate Quadratic FHE☆51Updated 8 years ago
- A decentralized privacy-preserving data sharing tool☆31Updated 3 years ago
- Go Ed25519 suitable for use in consensus-critical contexts.☆52Updated last year
- Nearly generic prime field implementation in Go☆24Updated 5 years ago
- Go implementation of OPAQUE (hidden password user registration and auth)☆58Updated 4 years ago
- NIST P elliptic curves (re-exported from crypto/internal/nistec)☆48Updated last year
- A simple service for interacting with an HSM or other PKCS#11 device.☆55Updated this week
- A Go implementation of OPAQUE, a password authenticated key exchange protocol.☆31Updated 6 years ago
- Golang "Post-quantum key exchange – a new hope." (Mirror of https://gitlab.com/yawning/newhope)☆78Updated 5 years ago
- SPHINCS-256 practical stateless hash-based signature scheme☆26Updated 8 years ago
- This is a toy implementation of the dudect ideas in Go. All credit goes to Oscar Reparaz, Josep Balasch and Ingrid Verbauwhede for dudect…☆18Updated 7 years ago
- Security and Privacy Assurance Research Test and Assessment (SPARTA) tool suite☆37Updated 7 years ago
- Oblivious Pseudorandom Functions (OPRFs) using Prime-Order Groups☆39Updated 7 months ago
- A CONIKS implementation in Golang☆115Updated 2 years ago
- CONIKS design documents☆16Updated 8 years ago
- APRICOT: Advanced Protocols for Real-world Implementation of Computational Oblivious Transfers☆16Updated 8 years ago
- A pure-go implementation of the Axolotl Ratchet, extracted from pond☆21Updated 8 years ago
- Experimental High Assurance Cryptographic Library