cfrg / pake-selectionLinks
☆40Updated 3 years ago
Alternatives and similar repositories for pake-selection
Users that are interested in pake-selection are comparing it to the libraries listed below
Sorting:
- Experimental implementation of KEMTLS in Rustls☆31Updated last year
- Hybrid Public Key Encryption☆51Updated last year
- Post-quantum cryptography certificates☆66Updated last month
- The anonymous credentials zoo☆16Updated 4 years ago
- FourQlib is an efficient and portable cryptographic library that provides functions for computing elliptic curve based operations on the …☆88Updated 2 years ago
- Deployments of fancy cryptography☆146Updated 2 months ago
- A list of the state of IETF protocols and PQC☆63Updated 2 weeks ago
- A C++ Implementation of Short Randomizable Signatures (PS Signatures) and EL PASSO (Privacy-preserving, Asynchronous Single Sign-On)☆25Updated 4 years ago
- Oblivious Pseudorandom Functions (OPRFs) using Prime-Order Groups☆38Updated 10 months ago
- The OPAQUE Asymmetric PAKE Protocol☆108Updated 5 months ago
- A python library that implements a number of Privacy Enhancing Technolgies☆134Updated 2 years ago
- BAT KEM/Signature Reference Implementation☆22Updated 3 years ago
- ☆81Updated 5 years ago
- Reference implementation of the Picnic post-quantum signature scheme☆164Updated 2 years ago
- Updated! (Dec2-2019) This is a C-language software library that provides optimized implementations of the Diffie-Hellman functions known …☆44Updated last year
- Exploration of NIST post-quantum signatures on-ramp candidates☆32Updated last month
- Sphinx-based Password Storage low-level library☆130Updated 5 months ago
- Implementation of cryptographic primitives in Go☆12Updated 2 years ago
- library providing OPRF and Threshold OPRF based on libsodium☆23Updated last week
- SQISign: Short Quaternion and Isogeny Signature – C implementation based on PARI/GP (obsolete implementation)☆27Updated 2 years ago
- OPAQUE protocol, a secure asymmetric password authenticated key exchange (aPAKE) that supports mutual authentication in a client-server s…☆78Updated 4 years ago
- Proof-of-concept implementation of the (V)OPRF protocol in https://datatracker.ietf.org/doc/draft-irtf-cfrg-voprf/☆23Updated 4 years ago
- Community Cryptography Test Vectors☆78Updated 2 months ago
- A C implementation of elliptic-curve-based Direct Anonymous Attestation (DAA) signatures. Created to support the Xaptum Edge Network Fabr…☆44Updated 3 years ago
- Supersingular Isogeny Diffie-Hellman in Go☆136Updated 5 years ago
- Hashing to Elliptic Curves☆81Updated 10 months ago
- Repo for DTLS 1.3☆32Updated 3 months ago
- Reference implementation of the BLZZRD variant of the BLISS Ring-LWE Signature Scheme☆16Updated 8 years ago
- FrodoKEM: Learning with Errors Key Encapsulation. FrodoKEM is a family of key-encapsulation mechanisms that are designed to be conservati…☆142Updated 7 months ago
- XPIR: Private Information Retrieval for Everyone☆118Updated 3 years ago