☆13Oct 6, 2020Updated 5 years ago
Alternatives and similar repositories for orchard
Users that are interested in orchard are comparing it to the libraries listed below
Sorting:
- ☆12May 7, 2021Updated 4 years ago
- BAT KEM/Signature Reference Implementation☆23Dec 28, 2021Updated 4 years ago
- Parses https://eprint.iacr.org/eprint-bin/search.pl?last=365&title=1 and sends you an email with the latest papers☆15Nov 11, 2020Updated 5 years ago
- Materials accompanying "Implementing an Elliptic Curve in Go"☆13Jul 29, 2017Updated 8 years ago
- PoC of Swift for Compute@Edge☆12Feb 3, 2022Updated 4 years ago
- Efficient Anonymous Tokens with Private Metadata Bit☆15Mar 7, 2023Updated 2 years ago
- ☆34Jul 9, 2020Updated 5 years ago
- ABE GPSW scheme using BLS pairing implemented in Rust.☆16May 23, 2023Updated 2 years ago
- A Zig implementation of EdDSA signatures with blind keys.☆17Jul 15, 2023Updated 2 years ago
- ☆43Sep 29, 2021Updated 4 years ago
- Proof of Device☆20Jan 20, 2023Updated 3 years ago
- ☆25Sep 25, 2024Updated last year
- Fast constant-time AES implementations on 32-bit architectures☆69Oct 17, 2024Updated last year
- Experimental High Assurance Cryptographic Library☆20Feb 1, 2016Updated 10 years ago
- C crypto library☆24Aug 2, 2023Updated 2 years ago
- Proof-of-concept implementation of the (V)OPRF protocol in https://datatracker.ietf.org/doc/draft-irtf-cfrg-voprf/☆23Aug 24, 2020Updated 5 years ago
- DNS proxy for enabling any application to use DNS Over HTTPS/DNS Over TLS/DNSCrypt☆22Aug 8, 2021Updated 4 years ago
- [RFC9380] Hash to curves - Rust reference implementation☆27Mar 10, 2024Updated last year
- A tweakable block cipher☆31May 17, 2024Updated last year
- Deterministic/nonce-reuse resistant authenticated encryption scheme using XChaCha20, implemented on libsodium.☆30Aug 5, 2024Updated last year
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆28Apr 20, 2018Updated 7 years ago
- Implementation and simulations for the "Reducing Metadata Leakage from Encrypted Data and Communication with PURBs" paper☆31Oct 26, 2023Updated 2 years ago
- Fork of dnscrypt-proxy to implement a multiple-relay-based DNS anonymization protocol (mu-ODNS)☆30Mar 28, 2025Updated 11 months ago
- c implementation of the OPAQUE protocol with bindings for python, php, ruby, lua, zig, java, erlang, golang, js and SASL. also supports a…☆87Jun 24, 2025Updated 8 months ago
- Routino is an application for finding a route between two points using the dataset of topographical information collected by http://www.O…☆15Feb 17, 2012Updated 14 years ago
- Updated! (Dec2-2019) This is a C-language software library that provides optimized implementations of the Diffie-Hellman functions known …☆44Nov 10, 2023Updated 2 years ago
- Source code for the VLDB 2021 paper.☆11May 19, 2021Updated 4 years ago
- A Simple Algorithm for Minimum Cuts in Near-Linear Time (SWAT '20)☆12Apr 24, 2020Updated 5 years ago
- Romanian Open Transit Initiative - repository of official, reverse engineered and converted transit resources which give you programmatic…☆10Jul 6, 2023Updated 2 years ago
- Open Cryptanalysis Platform☆13Feb 7, 2026Updated 3 weeks ago
- ☆38Mar 20, 2017Updated 8 years ago
- Plot pixels on a 320x200 256c canvas☆11Jan 8, 2024Updated 2 years ago
- SAT solvers from Knuth's The Art of Computer Programming, Vol. 4B☆10Jan 5, 2026Updated last month
- BinDex: A Two-Layered Index for Fast and Robust Scans (SIGMOD2020)☆10Jun 5, 2020Updated 5 years ago
- WASIX extensions for Zig ⚡☆12Jun 12, 2025Updated 8 months ago
- A gray and blue theme for JSDoc.☆10Jul 16, 2017Updated 8 years ago
- JWSACruncher v2☆10Updated this week
- Stream Processing ToolKit☆18Aug 14, 2015Updated 10 years ago
- Optimized implementation of ring-TESLA☆11Aug 4, 2016Updated 9 years ago