SSSaaS / sssa-python
Shamir's Secret Sharing Algorithm - helper cryptography module for Python
☆21Updated 4 years ago
Alternatives and similar repositories for sssa-python:
Users that are interested in sssa-python are comparing it to the libraries listed below
- Command line client for splitting secrets using Shamir's Secret Sharing Algorithm☆15Updated 8 years ago
- pure-python routines for curve25519/ed25519☆35Updated 5 years ago
- Go implementation of XMSS[MT] post-quantum hash-based signature scheme (rfc8391)☆24Updated 2 years ago
- A Python implementation of saltpack, mainly for testing. Only partial support for V2.☆104Updated 4 years ago
- CONIKS design documents☆16Updated 8 years ago
- An Implementation of Order-Revealing Encryption☆93Updated 4 years ago
- A highly performant merkle set data structure. To be ported to C later.☆74Updated 7 years ago
- Software for "Quantum-Resistant Cryptosystems from Supersingular Elliptic Curve Isogenies"☆90Updated 5 years ago
- specification and design documents☆54Updated 2 years ago
- A CONIKS implementation in Golang☆115Updated 2 years ago
- a Private Publish Subscribe System☆49Updated 11 months ago
- A python implementation of the Axolotl ratchet protocol.☆71Updated 7 years ago
- Links to stuff arising from or related to the HACS workshop.☆35Updated 7 years ago
- A Haskell library implementing the Noise protocol.☆98Updated 2 months ago
- Merkle-tree in Python☆71Updated 4 months ago
- ☆61Updated 6 months ago
- Λ ⚬ λ: Functional Lattice Cryptography☆230Updated 4 years ago
- Signcryption using libsodium.☆64Updated last year
- pure-python implementation of the SPAKE2 Password-Authenticated Key Exchange algorithm☆80Updated 6 months ago
- Optimised bilinear pairings over elliptic curves☆55Updated last year
- A memory-hard password hashing function.☆69Updated last year
- Oblivious Pseudorandom Functions (OPRFs) using Prime-Order Groups☆39Updated 6 months ago
- SPHINCS-256 practical stateless hash-based signature scheme☆26Updated 8 years ago
- entropy collection in JavaScript for your node and/or browser apps☆42Updated 10 years ago
- Prototype implementation of Prio, a system for the private computation of aggregate statistics.☆62Updated 7 years ago
- tunnel traffic through a genuine bittorrent connection☆65Updated 5 years ago
- Derive Curve25519 encryption keys and ed25519 signing keys from username and password via BLAKE2s hash and scrypt.☆20Updated 9 years ago
- Python bindings to the Ed25519 public-key signature system☆169Updated last year
- Go implementation of Miscreant: misuse-resistant encryption library with AES-SIV (RFC 5297) and AES-PMAC-SIV support☆38Updated 4 years ago
- OPAQUE protocol, a secure asymmetric password authenticated key exchange (aPAKE) that supports mutual authentication in a client-server s…☆78Updated 3 years ago