cyberphone / cbor-everywhereLinks
CBOR Information Resources
☆12Updated last week
Alternatives and similar repositories for cbor-everywhere
Users that are interested in cbor-everywhere are comparing it to the libraries listed below
Sorting:
- Hybrid Public Key Encryption☆51Updated last year
- VDAF specification☆23Updated 3 weeks ago
- Apache milagro (Incubating)☆36Updated last year
- Tree-based KEM for group key management☆44Updated 7 years ago
- Oblivious Pseudorandom Functions (OPRFs) using Prime-Order Groups☆38Updated 10 months ago
- Javascript implementation of the Ristretto255 group operations, built on top of the popular TweetNaCl.js crypto library☆34Updated last year
- Implementation of cryptographic primitives in Go☆13Updated 2 years ago
- A small and easy to use HPKE implementation in Go.☆20Updated 7 months ago
- Circuits for functions of interest to cryptography☆27Updated last year
- The BBS Signature Scheme☆89Updated 3 weeks ago
- Infinitely presentable (aeon) rerandomisable (flux) anonymous credentials.☆28Updated 4 years ago
- Pointcheval Sanders signature☆27Updated 5 years ago
- Community Cryptography Test Vectors☆82Updated 3 months ago
- Proof-of-concept implementation of the (V)OPRF protocol in https://datatracker.ietf.org/doc/draft-irtf-cfrg-voprf/☆23Updated 4 years ago
- DRAFT: did:web Decentralized Identifier Method Specification☆47Updated last year
- ☆14Updated last week
- Readable Implementation of Strobe in Go☆26Updated 3 years ago
- W3C Data Integrity Specification☆44Updated 2 months ago
- A pure-Rust implementation of group operations on Ristretto and Curve25519☆28Updated 11 months ago
- Curve ecGFp5☆68Updated 3 years ago
- The BLAKE3 paper: specifications, analysis, and design rationale☆180Updated 3 years ago
- A collection of high-performance crypto implementations.☆53Updated 3 months ago
- Linked Data Capabilities reference implementation☆26Updated 2 months ago
- ☆17Updated this week
- ABE GPSW scheme using BLS pairing implemented in Rust.☆15Updated 2 years ago
- Hashing to Elliptic Curves☆80Updated 11 months ago
- Proves knowledge of an ECDSA-P256 signature under one of many public keys that are stored in a list.☆216Updated last month
- Pure Java implementation of Ed25519☆20Updated 2 years ago
- An implementation of a verifiable oblivious pseudorandom function (RFC 9497)☆69Updated 3 months ago
- Efficient Anonymous Tokens with Private Metadata Bit☆15Updated 2 years ago