edoroth / orchardLinks
☆13Updated 4 years ago
Alternatives and similar repositories for orchard
Users that are interested in orchard are comparing it to the libraries listed below
Sorting:
- BAT KEM/Signature Reference Implementation☆22Updated 3 years ago
- INACTIVE - A C library implementing a basic version of the Prio system for private aggregation. https://crypto.stanford.edu/prio/☆79Updated 4 years ago
- Signcryption using libsodium.☆66Updated last year
- An implementation of Mike Hamburg's Ed448 (Goldilocks) curve - derived from libdecaf. This is a mirror of https://bugs.otr.im/otrv4/libgo…☆18Updated 5 years ago
- A tiny C cryptographic library to encrypt sessions, authenticate messages, sign, hash, etc. based only on SHA-3 and Curve25519☆69Updated 4 years ago
- A collection of high-performance crypto implementations.☆52Updated 4 months ago
- Updated! (Dec2-2019) This is a C-language software library that provides optimized implementations of the Diffie-Hellman functions known …☆44Updated last year
- Proof-of-concept implementation of the (V)OPRF protocol in https://datatracker.ietf.org/doc/draft-irtf-cfrg-voprf/☆23Updated 5 years ago
- ☆40Updated 3 years ago
- Optimized implementation of ring-TESLA☆11Updated 9 years ago
- Materials accompanying "Implementing an Elliptic Curve in Go"☆13Updated 8 years ago
- Deterministic/nonce-reuse resistant authenticated encryption scheme using XChaCha20, implemented on libsodium.☆30Updated last year
- Circuits for functions of interest to cryptography☆28Updated last year
- Implementation of cryptographic primitives in Go☆13Updated 2 years ago
- Implementation and simulations for the "Reducing Metadata Leakage from Encrypted Data and Communication with PURBs" paper☆30Updated last year
- A tweakable block cipher☆31Updated last year
- Elliptic curves Rust reference implementation☆16Updated last year
- ☆82Updated 5 years ago
- Fast constant-time AES implementations on 32-bit architectures☆66Updated 10 months ago
- Reference implementations of post-quantum cryptographic primitives☆29Updated last week
- Parses https://eprint.iacr.org/eprint-bin/search.pl?last=365&title=1 and sends you an email with the latest papers☆15Updated 4 years ago
- VDAF specification☆23Updated this week
- Sphinx-based Password Storage low-level library☆130Updated 7 months ago
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆28Updated 7 years ago
- C crypto library☆24Updated 2 years ago
- Optimized implementation of the Picnic signature scheme☆81Updated 3 years ago
- Banquet implementation☆13Updated 3 years ago
- A Zig implementation of EdDSA signatures with blind keys.☆17Updated 2 years ago
- Tornado is a compiler producing masked bitsliced implementations proven secure in the bit/register probing model☆18Updated 4 years ago
- Tools for power measurements of post-quantum cryptographic algorithms☆29Updated 5 years ago