Golang (X)ChaCha20 stream cipher. (Mirror)
☆60May 2, 2023Updated 2 years ago
Alternatives and similar repositories for chacha20
Users that are interested in chacha20 are comparing it to the libraries listed below
Sorting:
- High Assurance Cryptographic Software☆10Dec 23, 2025Updated 2 months ago
- Implementation of https://www.ietf.org/archive/id/draft-denis-aegis-aead-00.html / https://competitions.cr.yp.to/round3/aegisv11.pdf☆15Mar 25, 2025Updated 11 months ago
- Guidelines, procedures, and templates used by the IETF Moderators team.☆24Feb 17, 2026Updated 2 weeks ago
- Official SQISignHD code, version under continuous development.☆12Jul 18, 2025Updated 7 months ago
- ☆18Oct 30, 2023Updated 2 years ago
- The crypto repository contains some additional cryptographic packages for Go☆28Jul 7, 2016Updated 9 years ago
- Stronger and Faster Side-Channel Protections for CSIDH☆20Dec 20, 2020Updated 5 years ago
- ☆21Dec 16, 2022Updated 3 years ago
- Java implementation of FIPS 202, SHA3-xxxx, SHAKE128, SHAKE256☆20Oct 13, 2020Updated 5 years ago
- Implementations of a fast Elliptic-curve Diffie-Hellman primitive☆27Apr 13, 2015Updated 10 years ago
- A privacy-preserving digital version of punch cards used in store loyalty programs☆11Apr 19, 2021Updated 4 years ago
- A pure Go implementation of the ChaCha20 stream cipher.☆45Nov 7, 2015Updated 10 years ago
- A blake2s java implementation☆19Jan 31, 2016Updated 10 years ago
- CDLS: Proving Knowledge of Committed Discrete Logarithms with Soundness☆11Nov 2, 2024Updated last year
- Post-quantum Wireguard (Theory)☆12Sep 9, 2020Updated 5 years ago
- Around applying the VDF construcrtion based on isogenies between super-signular elliptic curves☆14Oct 19, 2021Updated 4 years ago
- Implementation of the single-step key derivation function (KDF) as described in NIST Special Publication 800-56C Rev1 supporting messages…☆10Mar 12, 2023Updated 2 years ago
- ☆13Feb 23, 2026Updated 2 weeks ago
- ☆11Mar 19, 2023Updated 2 years ago
- ☆14May 3, 2019Updated 6 years ago
- Materials accompanying "Implementing an Elliptic Curve in Go"☆13Jul 29, 2017Updated 8 years ago
- CBOR Information Resources☆13Feb 16, 2026Updated 3 weeks ago
- Code for zero-knowledge middleboxes☆63Jul 26, 2022Updated 3 years ago
- Parses https://eprint.iacr.org/eprint-bin/search.pl?last=365&title=1 and sends you an email with the latest papers☆15Nov 11, 2020Updated 5 years ago
- Official implementation of paper "HiAE: A High-Throughput Authenticated Encryption Algorithm for Cross-Platfor Efficiency"☆19Nov 11, 2025Updated 3 months ago
- A pure rust implementation of the gimli cipher☆13Jan 26, 2022Updated 4 years ago
- An Internet-Draft for the Balloon Key Derivation Function (BKDF), a memory-hard password hashing and password-based key derivation functi…☆11Jun 29, 2025Updated 8 months ago
- Specifications for Privacy Proxy Implementations☆32Updated this week
- A minimal RedJubjub implementation for use in Zebra.☆30Feb 13, 2026Updated 3 weeks ago
- Lecture notes on the Foundations of Isogeny-based Cryptography☆33Sep 5, 2024Updated last year
- A C++ Implementation of Short Randomizable Signatures (PS Signatures) and EL PASSO (Privacy-preserving, Asynchronous Single Sign-On)☆26Jul 8, 2021Updated 4 years ago
- Pointcheval Sanders signature☆27Jan 16, 2020Updated 6 years ago
- ChaCha20 and XChaCha20 stream ciphers☆73Jul 9, 2018Updated 7 years ago
- libsodium-jna is a java library that binds to libsodium C crypto APIs with Java Native Access (JNA)☆54Feb 5, 2026Updated last month
- Deterministic And Verifiable Randomness On Schnorr signatures☆12Nov 18, 2017Updated 8 years ago
- FIPS-204 (ML-DSA) implementation in Go☆18Feb 13, 2026Updated 3 weeks ago
- Implementation and simulations for the "Reducing Metadata Leakage from Encrypted Data and Communication with PURBs" paper☆31Oct 26, 2023Updated 2 years ago
- Xoodyak, a lightweight and versatile cryptographic scheme implemented in Rust.☆30Apr 24, 2025Updated 10 months ago
- High Speed elliptic curve signature system using a 260-bit Granger Moss Prime.☆14Jun 3, 2021Updated 4 years ago