VirgilSecurity / virgil-phe-goLinks
Password-Hardened Encryption protocol implemented in Go.
☆15Updated 5 years ago
Alternatives and similar repositories for virgil-phe-go
Users that are interested in virgil-phe-go are comparing it to the libraries listed below
Sorting:
- Implements ristretto255, a fast prime-order group.☆98Updated 3 years ago
- Supplementary cryptography libraries☆17Updated 3 years ago
- Pure Go implementation of the Ristretto prime-order group over Edwards25519☆88Updated 2 years ago
- A CONIKS implementation in Golang☆115Updated 2 years ago
- ☆40Updated 3 years ago
- Supersingular Isogeny Diffie-Hellman in Go☆135Updated 5 years ago
- Golang "Post-quantum key exchange – a new hope." (Mirror of https://gitlab.com/yawning/newhope)☆78Updated 5 years ago
- Package bn256 implements a particular bilinear group.☆128Updated 2 weeks ago
- Package fourq implements FourQ, a high-speed elliptic curve at the 128-bit security level.☆55Updated 7 months ago
- Noise socket implementation in Go☆62Updated 2 years ago
- A collection of algorithms that can do join between two parties while preserving the privacy of keys on which the join happens☆210Updated 7 months ago
- Go implementation of OPAQUE (hidden password user registration and auth)☆57Updated 4 years ago
- a protocol to encrypt communications and a cryptographic library based on Disco☆205Updated 4 years ago
- Constant time big numbers for Go☆103Updated 3 months ago
- ☆278Updated last year
- An implementation of Noise in Go☆42Updated 7 years ago
- FourQlib is an efficient and portable cryptographic library that provides functions for computing elliptic curve based operations on the …☆86Updated 2 years ago
- Specification of the Noise Socket protocol☆58Updated 7 years ago
- Self-contained educational implementation of the BLISS-B Bimodal Lattice Signature Scheme☆14Updated 9 years ago
- Go implementation of BLAKE2 (b) cryptographic hash function (optimized for 64-bit platforms).☆93Updated 7 years ago
- ☆58Updated 8 years ago
- Crypto Audit Guidelines☆134Updated 4 years ago
- Hashing to Elliptic Curves☆81Updated 9 months ago
- draft-irtf-cfrg-gcmsiv-00☆13Updated 3 years ago
- Reference implementation of the Picnic post-quantum signature scheme☆163Updated last year
- DEPRECATED – See NOTICE below about migration to new repository – Post-quantum key exchange from the ring learning with errors problem☆59Updated 8 years ago
- An Implementation of Order-Revealing Encryption☆94Updated 4 years ago
- Cryptographic Addition Chain Generation in Go☆189Updated 11 months ago
- Prototype implementation of Prio, a system for the private computation of aggregate statistics.☆63Updated 7 years ago
- The anonymous credentials zoo☆16Updated 4 years ago