cfrg / pake-selectionLinks
☆40Updated 3 years ago
Alternatives and similar repositories for pake-selection
Users that are interested in pake-selection are comparing it to the libraries listed below
Sorting:
- Experimental implementation of KEMTLS in Rustls☆31Updated last year
- Hybrid Public Key Encryption☆51Updated last year
- Post-quantum cryptography certificates☆68Updated last week
- ☆82Updated 5 years ago
- FourQlib is an efficient and portable cryptographic library that provides functions for computing elliptic curve based operations on the …☆89Updated 2 years ago
- OPAQUE protocol, a secure asymmetric password authenticated key exchange (aPAKE) that supports mutual authentication in a client-server s…☆79Updated 4 years ago
- The anonymous credentials zoo☆16Updated 4 years ago
- Deployments of fancy cryptography☆150Updated last week
- Sphinx-based Password Storage low-level library☆130Updated 6 months ago
- A C++ Implementation of Short Randomizable Signatures (PS Signatures) and EL PASSO (Privacy-preserving, Asynchronous Single Sign-On)☆25Updated 4 years ago
- Implementation of cryptographic primitives in Go☆13Updated 2 years ago
- library providing OPRF and Threshold OPRF based on libsodium☆24Updated 2 weeks ago
- The OPAQUE Asymmetric PAKE Protocol☆108Updated 6 months ago
- Oblivious Pseudorandom Functions (OPRFs) using Prime-Order Groups☆38Updated 10 months ago
- Reference implementation of the Picnic post-quantum signature scheme☆164Updated 2 years ago
- BAT KEM/Signature Reference Implementation☆22Updated 3 years ago
- Updated! (Dec2-2019) This is a C-language software library that provides optimized implementations of the Diffie-Hellman functions known …☆44Updated last year
- A python library that implements a number of Privacy Enhancing Technolgies☆136Updated 2 years ago
- Small, self-contained C implementation of Ristretto255 based on libdecaf☆13Updated 6 years ago
- [work in progress] Python framework for supporting cryptographic game-hopping proofs☆13Updated 2 years ago
- A list of the state of IETF protocols and PQC☆66Updated last month
- Reference implementation of the BLZZRD variant of the BLISS Ring-LWE Signature Scheme☆16Updated 8 years ago
- An Implementation of Order-Revealing Encryption☆95Updated 4 years ago
- Go implementation of XMSS[MT] post-quantum hash-based signature scheme (rfc8391)☆23Updated 3 years ago
- Exploration of NIST post-quantum signatures on-ramp candidates☆34Updated 2 months ago
- SIDH Library is a fast and portable software library that implements state-of-the-art supersingular isogeny cryptographic schemes. The ch…☆323Updated 2 years ago
- ☆12Updated last year
- Community Cryptography Test Vectors☆82Updated 3 months ago
- Cryptographic Addition Chain Generation in Go☆191Updated last year
- Deterministic/nonce-reuse resistant authenticated encryption scheme using XChaCha20, implemented on libsodium.☆30Updated 11 months ago