buggywhip / blake2_py
a pure Python implementation of the hashing function BLAKE2
☆28Updated 6 years ago
Related projects: ⓘ
- A fork of floodyberry's ed25519-donna modified to support the Ristretto prime-order group☆13Updated 3 years ago
- A memory-hard password hashing function.☆65Updated last year
- Python implementation of FIPS SHA3 and SHAKE☆44Updated 6 years ago
- Non-C Implementations of the yescrypt KDF.☆29Updated 5 years ago
- ☆20Updated this week
- Python bindings to the Crypto++ library☆49Updated last year
- Snowshoe - Portable, Secure, Fast Elliptic Curve Math Library in C☆62Updated 6 years ago
- FLECC_IN_C is a FLexible Elliptic Curve Cryptography library written IN C☆17Updated 6 years ago
- APRICOT: Advanced Protocols for Real-world Implementation of Computational Oblivious Transfers☆15Updated 7 years ago
- Software for "Quantum-Resistant Cryptosystems from Supersingular Elliptic Curve Isogenies"☆90Updated 5 years ago
- pure-python routines for curve25519/ed25519☆35Updated 4 years ago
- Signature scheme submitted to NIST's Post-Quantum Cryptography Project☆73Updated 6 years ago
- A Python implementation of the SPHINCS-256 scheme☆14Updated 8 years ago
- 👥 A Python post-quantum cryptography library☆63Updated 8 years ago
- An Implementation of the Fully Homomorphic Smart-Vercauteren Cryptosystem☆43Updated 9 years ago
- Cymric - Portable secure random number generator☆20Updated 10 years ago
- Python extension module implementing BLAKE2 hash function☆40Updated 4 years ago
- NTRU Python Library with Application to Encrypted Domain☆28Updated 7 months ago
- Backport of hashlib.sha3 for 2.7 to 3.5☆29Updated last year
- DEPRECATED – See NOTICE below about migration to new repository – Post-quantum key exchange from the ring learning with errors problem☆59Updated 8 years ago
- Signature scheme submitted to NIST's Post-Quantum Cryptography Project☆28Updated 6 years ago
- This software library is a C-language + optimized assembly code that supports an instance of the Super-Singular Isogeny Diffie-Hellman (S…☆9Updated 5 years ago
- A user-first approach to threat modeling.☆14Updated 4 years ago
- An AES-based 384 bit permutation.☆18Updated 5 years ago
- secure messaging, file-transfer, and directory synchronization☆42Updated 7 years ago
- multiaddr implementation in Python☆33Updated last year
- A python implementation of the Axolotl ratchet protocol.☆72Updated 7 years ago
- Reference implementations (software)☆85Updated 7 years ago
- The SipHash-2-4 C reference implementation, CFFI-wrapped for Python☆12Updated 7 years ago