buggywhip / blake2_py
a pure Python implementation of the hashing function BLAKE2
☆28Updated 6 years ago
Alternatives and similar repositories for blake2_py:
Users that are interested in blake2_py are comparing it to the libraries listed below
- multiaddr implementation in Python☆33Updated last year
- A user-first approach to threat modeling.☆16Updated 5 years ago
- Collection of test vectors for cryptographic operations☆11Updated 9 years ago
- Dan Kaminsky's clock drift entropy generator☆6Updated 10 years ago
- An implementation of Publicly Verifiably Secret Sharing (PVSS) in Swift.☆12Updated 7 years ago
- Python implementation of the multihash specification☆19Updated last year
- Python Library for InterNetworking with TeleHash☆26Updated 9 years ago
- A fork of floodyberry's ed25519-donna modified to support the Ristretto prime-order group☆13Updated 4 years ago
- library for implementing the server side of the mix network: mixes and providers☆26Updated 2 years ago
- [ARCHIVED] DEPRECATED — ipfs-web-app tool☆19Updated 4 years ago
- NTRU Python Library with Application to Encrypted Domain☆30Updated 11 months ago
- System tuning recommendations for running cryptographic applications☆23Updated 8 years ago
- Pure Python SSL, TLS and DTLS library☆35Updated 6 years ago
- A Python port of the triplesec library.☆81Updated last year
- Software for "Quantum-Resistant Cryptosystems from Supersingular Elliptic Curve Isogenies"☆90Updated 5 years ago
- Lattice-Based Post-Quantum Authenticated Key Exchange☆18Updated 7 years ago
- specification and design documents☆54Updated 2 years ago
- Python bindings to the Crypto++ library☆48Updated last year
- Zcash Vanity Address Generator☆22Updated 3 years ago
- ☆10Updated 6 years ago
- libsodium tests against crypto-test-vectors☆9Updated 8 years ago
- Infinitely presentable (aeon) rerandomisable (flux) anonymous credentials.☆28Updated 4 years ago
- A python implementation for Noise Protocol Framework☆49Updated 2 years ago
- Fault attack agaisnt EdDSA demonstrated on an Arduino Nano board, allowing for partial key recovery and fake signatures.☆71Updated 7 years ago
- Keyname format for public-key fingerprints☆22Updated 10 years ago
- Python ctypes wrapper for libsodium☆83Updated 10 months ago
- repository for tracking open tasks☆18Updated 7 years ago
- Signature scheme submitted to NIST's Post-Quantum Cryptography Project☆74Updated 7 years ago
- pure-python routines for curve25519/ed25519☆35Updated 4 years ago
- A Python reimplementation of the one-time ring signatures as found in Monero☆74Updated 2 years ago