cfrg / pake-selectionLinks
☆41Updated 4 years ago
Alternatives and similar repositories for pake-selection
Users that are interested in pake-selection are comparing it to the libraries listed below
Sorting:
- Hybrid Public Key Encryption☆51Updated last year
- Post-quantum cryptography certificates☆71Updated 3 weeks ago
- Experimental implementation of KEMTLS in Rustls☆32Updated last year
- Deployments of fancy cryptography☆154Updated 2 months ago
- Implementation of cryptographic primitives in Go☆13Updated 2 years ago
- ☆82Updated 5 years ago
- BAT KEM/Signature Reference Implementation☆22Updated 3 years ago
- FourQlib is an efficient and portable cryptographic library that provides functions for computing elliptic curve based operations on the …☆90Updated 3 years ago
- Oblivious Pseudorandom Functions (OPRFs) using Prime-Order Groups☆38Updated last year
- Sphinx-based Password Storage low-level library☆129Updated 8 months ago
- A C++ Implementation of Short Randomizable Signatures (PS Signatures) and EL PASSO (Privacy-preserving, Asynchronous Single Sign-On)☆25Updated 4 years ago
- The anonymous credentials zoo☆16Updated 4 years ago
- The OPAQUE Asymmetric PAKE Protocol☆110Updated 8 months ago
- ☆18Updated last year
- OPAQUE protocol, a secure asymmetric password authenticated key exchange (aPAKE) that supports mutual authentication in a client-server s…☆81Updated 4 years ago
- Community Cryptography Test Vectors☆84Updated 5 months ago
- A python library that implements a number of Privacy Enhancing Technolgies☆136Updated 2 years ago
- Go implementation of XMSS[MT] post-quantum hash-based signature scheme (rfc8391)☆23Updated 3 years ago
- A C implementation of elliptic-curve-based Direct Anonymous Attestation (DAA) signatures. Created to support the Xaptum Edge Network Fabr…☆44Updated 4 years ago
- Updated! (Dec2-2019) This is a C-language software library that provides optimized implementations of the Diffie-Hellman functions known …☆44Updated last year
- Reference implementation of the Picnic post-quantum signature scheme☆165Updated 2 years ago
- ☆36Updated 3 years ago
- Proof-of-concept implementation of the (V)OPRF protocol in https://datatracker.ietf.org/doc/draft-irtf-cfrg-voprf/☆23Updated 5 years ago
- Deterministic/nonce-reuse resistant authenticated encryption scheme using XChaCha20, implemented on libsodium.☆30Updated last year
- [work in progress] Python framework for supporting cryptographic game-hopping proofs☆13Updated 2 years ago
- SQISign: Short Quaternion and Isogeny Signature – C implementation based on PARI/GP (obsolete implementation)☆27Updated 2 years ago
- A memory-hard password hashing function.☆70Updated 2 years ago
- Asynchronous delegated key generation without shared secrets (DRAFT)☆70Updated last year
- Coordination of implementation and interop specific details☆122Updated 5 months ago
- Crypto Audit Guidelines☆134Updated 4 years ago