cfrg / pake-selection
☆39Updated 3 years ago
Alternatives and similar repositories for pake-selection:
Users that are interested in pake-selection are comparing it to the libraries listed below
- Experimental implementation of KEMTLS in Rustls☆29Updated last year
- Hybrid Public Key Encryption☆50Updated 7 months ago
- Oblivious Pseudorandom Functions (OPRFs) using Prime-Order Groups☆39Updated 5 months ago
- Post-quantum cryptography certificates☆58Updated 3 weeks ago
- Deployments of fancy cryptography☆134Updated last month
- FourQlib is an efficient and portable cryptographic library that provides functions for computing elliptic curve based operations on the …☆82Updated 2 years ago
- ☆11Updated last year
- library providing OPRF and Threshold OPRF based on libsodium☆21Updated 3 weeks ago
- BAT KEM/Signature Reference Implementation☆20Updated 3 years ago
- Exploration of NIST post-quantum signatures on-ramp candidates☆25Updated last month
- OPAQUE protocol, a secure asymmetric password authenticated key exchange (aPAKE) that supports mutual authentication in a client-server s…☆77Updated 3 years ago
- SQISign: Short Quaternion and Isogeny Signature – C implementation based on PARI/GP (obsolete implementation)☆27Updated last year
- ☆81Updated 4 years ago
- Deterministic/nonce-reuse resistant authenticated encryption scheme using XChaCha20, implemented on libsodium.☆28Updated 6 months ago
- A C++ Implementation of Short Randomizable Signatures (PS Signatures) and EL PASSO (Privacy-preserving, Asynchronous Single Sign-On)☆25Updated 3 years ago
- A list of the state of IETF protocols and PQC☆50Updated 3 weeks ago
- Proof-of-concept implementation of the (V)OPRF protocol in https://datatracker.ietf.org/doc/draft-irtf-cfrg-voprf/☆23Updated 4 years ago
- Isogeny-based signature using Unruh's construction and the SIDH library☆18Updated 7 years ago
- Hashing to Elliptic Curves☆81Updated 5 months ago
- Implementation of cryptographic primitives in Go☆12Updated last year
- Script generated finite field arithmetic for elliptic curve cryptography☆17Updated this week
- The OPAQUE Asymmetric PAKE Protocol☆102Updated 3 weeks ago
- SABER is a Module-LWR based KEM submitted to NIST☆49Updated 2 years ago
- XPIR: Private Information Retrieval for Everyone☆116Updated 3 years ago
- ☆22Updated 2 years ago
- Python implementations of FIPS 203,204,205 (+ python wrappers for NIST's ACVP-Server crypto code)☆35Updated 2 weeks ago
- ☆32Updated 3 years ago
- OPAQUE asymmetric PAKE, and its threshold implementation. Experimental, not audited.☆16Updated 3 years ago
- The anonymous credentials zoo☆16Updated 3 years ago
- Implementation of SoftSpokenOT. Forked from libOTe.☆11Updated 9 months ago