WARNING: Deprecated! See Privacy Pass
☆99Jan 5, 2017Updated 9 years ago
Alternatives and similar repositories for challenge-bypass-specification
Users that are interested in challenge-bypass-specification are comparing it to the libraries listed below
Sorting:
- Package fourq implements FourQ, a high-speed elliptic curve at the 128-bit security level.☆54Oct 14, 2024Updated last year
- Keyname format for public-key fingerprints☆22Jun 4, 2014Updated 11 years ago
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆28Apr 20, 2018Updated 7 years ago
- Implementation of cryptographic primitives in Go☆13Mar 13, 2023Updated 2 years ago
- asynchronous I/O in Rust☆14Jan 8, 2017Updated 9 years ago
- App for controlling the DNSCrypt Proxy on Android☆13Dec 28, 2017Updated 8 years ago
- OPAQUE asymmetric PAKE, and its threshold implementation. Experimental, not audited.☆17Jun 16, 2021Updated 4 years ago
- [RFC9380] Hash to curves - Rust reference implementation☆27Mar 10, 2024Updated last year
- Specifications for Privacy Proxy Implementations☆32Feb 24, 2026Updated last week
- ipcrypt implementation in C☆33Apr 18, 2025Updated 10 months ago
- An implementation of the axolotl ratchet based on libsodium.☆23Oct 4, 2022Updated 3 years ago
- Privacy-preserving Tor statistics aggregation tool that implements the secret-sharing variant of the PrivEx algorithm.☆26Sep 21, 2020Updated 5 years ago
- The anonymous credentials zoo☆16Mar 17, 2021Updated 4 years ago
- Implementation of libsodium's secretstream in Go☆20Feb 10, 2026Updated 3 weeks ago
- Initial discussions on signatures of WebAssembly modules.☆18May 18, 2022Updated 3 years ago
- An RFC5297-compliant C implementation of AES-SIV☆20Oct 15, 2020Updated 5 years ago
- ☆34Jul 9, 2020Updated 5 years ago
- ☆29Jul 29, 2014Updated 11 years ago
- BAT KEM/Signature Reference Implementation☆23Dec 28, 2021Updated 4 years ago
- Golang client for HyperLogLog daemon (hlld)☆21Jan 31, 2016Updated 10 years ago
- Protected E-mail Headers☆73Feb 7, 2020Updated 6 years ago
- Table cat☆21Feb 21, 2018Updated 8 years ago
- ☆38Dec 16, 2021Updated 4 years ago
- Go implementation of libhydrogen - a lightweight, easy-to-use crypto library☆24Mar 23, 2017Updated 8 years ago
- A way to cryptographically hash objects (in the JSON-ish sense) that works cross-language. And, therefore, cross-encoding.☆146Jun 19, 2023Updated 2 years ago
- Meta-repository for Miscreant: misuse-resistant symmetric encryption library with AES-SIV (RFC 5297) and AES-PMAC-SIV support☆474Sep 3, 2019Updated 6 years ago
- Implements ristretto255, a fast prime-order group.☆110Feb 19, 2026Updated last week
- OZ: a sandboxing system targeting everyday workstation applications☆440Apr 18, 2018Updated 7 years ago
- Experimental High Assurance Cryptographic Library☆20Feb 1, 2016Updated 10 years ago
- A utility to make deflate dictionaries☆119Jul 16, 2018Updated 7 years ago
- ☆13Oct 6, 2020Updated 5 years ago
- Golang "Post-quantum key exchange – a new hope." (Mirror of https://gitlab.com/yawning/newhope)☆79Sep 2, 2019Updated 6 years ago
- Secure multiparty messaging (kindof)☆21Jun 2, 2016Updated 9 years ago
- axolotl based on libsodium☆22Jul 25, 2016Updated 9 years ago
- embd-go is an embeddable command-line tool for embedding data files in Go source code, specially crafted for easy use with `go generate`.☆27Jan 13, 2016Updated 10 years ago
- Simple OS keychain bindings for password storage in Go (Golang)☆25May 16, 2017Updated 8 years ago
- Implementation of KangarooTwelve in Go☆94Jun 14, 2021Updated 4 years ago
- Tools for attacking cryptographic implementations.☆21Oct 27, 2016Updated 9 years ago
- Proposals for the Anti-Fraud Community Group.☆25Oct 28, 2022Updated 3 years ago