bernedogit / amber
Cryptography library. X25519, Ed25519, qDSA, Elligator2, Ristretto, ChaCha20, Blake2, Poly1305, Scrypt, Noise protocol, File encryption in C++
☆34Updated 5 years ago
Alternatives and similar repositories for amber:
Users that are interested in amber are comparing it to the libraries listed below
- Updated! (Dec2-2019) This is a C-language software library that provides optimized implementations of the Diffie-Hellman functions known …☆44Updated last year
- A simple proof of work, mainly designed to mitigate DDoS attacks.☆25Updated 4 years ago
- axolotl based on libsodium☆22Updated 8 years ago
- Optimized block functions for the ChaCha stream cipher☆49Updated 5 years ago
- C implementation of Elligator 2 for Curve25519☆31Updated 3 years ago
- DEPRECATED: A C++ Elligator2 implementation☆15Updated 4 years ago
- Reference implementations (software)☆85Updated 8 years ago
- Python bindings to the Crypto++ library☆48Updated last year
- A SPAKE2+ Elligator Edition implementation for libsodium 1.0.16+☆41Updated 4 years ago
- A tiny implementation of SHA-3, SHAKE, Keccak, and sha3sum☆98Updated 4 years ago
- Snowshoe - Portable, Secure, Fast Elliptic Curve Math Library in C☆63Updated 7 years ago
- mirror of djb's "NaCl: Networking and Cryptography library"☆49Updated 13 years ago
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆28Updated 6 years ago
- A C implementation of elliptic-curve-based Direct Anonymous Attestation (DAA) signatures. Created to support the Xaptum Edge Network Fabr…☆45Updated 3 years ago
- Wiki for Noise development☆82Updated 8 years ago
- Xoodyak, a lightweight and versatile cryptographic scheme implemented in Rust.☆29Updated 11 months ago
- BLAKE2 AVX2 implementations☆23Updated 5 years ago
- ☆57Updated 7 years ago
- Derive Curve25519 encryption keys and ed25519 signing keys from username and password via BLAKE2s hash and scrypt.☆20Updated 8 years ago
- i2p c++ implementation☆19Updated 10 years ago
- ZINA is a secure messaging protocol for mobile devices☆21Updated 6 years ago
- System tuning recommendations for running cryptographic applications☆23Updated 8 years ago
- Tools for using TweetNaCl☆23Updated 7 years ago
- An implementation of Mike Hamburg's Ed448 (Goldilocks) curve - derived from libdecaf. This is a mirror of https://bugs.otr.im/otrv4/libgo…☆18Updated 4 years ago
- Non-C Implementations of the yescrypt KDF.☆29Updated 6 years ago
- A tiny C cryptographic library to encrypt sessions, authenticate messages, sign, hash, etc. based only on SHA-3 and Curve25519☆66Updated 3 years ago
- Password Hashing Competition Submissions☆71Updated 10 years ago
- An implementation of the axolotl ratchet based on libsodium.☆23Updated 2 years ago
- Authenticated encryption for streams and arbitrary large files using libsodium☆52Updated 4 years ago
- Implementations of a fast Elliptic-curve Diffie-Hellman primitive☆25Updated 9 years ago