gherynos / secreteLinks
ECIES implementation with Curve25519.
☆16Updated 5 months ago
Alternatives and similar repositories for secrete
Users that are interested in secrete are comparing it to the libraries listed below
Sorting:
- Curve25519 ECIES☆10Updated 9 years ago
- Deterministic/nonce-reuse resistant authenticated encryption scheme using XChaCha20, implemented on libsodium.☆30Updated last year
- Blind RSA signatures for OpenSSL/BoringSSL.☆17Updated last month
- Pure Java implementation of Ed25519☆20Updated 2 years ago
- ☆20Updated 5 years ago
- libsodium-jna is a java library that binds to libsodium C crypto APIs with Java Native Access (JNA)☆54Updated last year
- ☆23Updated 5 years ago
- ☆18Updated 2 years ago
- Audit Proposals and Reports for RandomX☆12Updated 6 years ago
- Simple ECIES, ECDSA and AES library for Python, supporting OpenSSL and pure-Python environments☆26Updated 5 years ago
- A library for peer discovery inside the Tor network☆28Updated last year
- Auditing Applied Cryptography☆11Updated 6 years ago
- Oblivious Pseudorandom Functions (OPRFs) using Prime-Order Groups☆38Updated last year
- Provider library - a library of small helpers. These may or may not become part of OpenSSL at some point☆12Updated 6 months ago
- Results of a recent FOIA for NIST documents related to the design of Dual EC DRBG. Via EFF and Rep. Grayson's office. See README for deta…☆24Updated 10 years ago
- a Tahoe-LAFS storage-system plugin which authorizes storage operations based on privacy-respecting tokens☆10Updated 6 months ago
- C bindings over RUST sr25519 https://github.com/w3f/schnorrkel☆31Updated 3 years ago
- Proof of Device☆21Updated 2 years ago
- Java implementation of multiaddr☆16Updated last week
- Pointcheval Sanders signature☆27Updated 5 years ago
- A standalone AES-KW (AES Key Wrap) implementation.☆14Updated last year
- A privacy-preserving digital version of punch cards used in store loyalty programs☆11Updated 4 years ago
- Compact Proofs of Retrievability☆14Updated 11 years ago
- ECIES implemented in Go☆31Updated 6 years ago
- Implementation and simulations for the "Reducing Metadata Leakage from Encrypted Data and Communication with PURBs" paper☆30Updated 2 years ago
- Xoodyak, a lightweight and versatile cryptographic scheme implemented in Rust.☆30Updated 7 months ago
- Algorand's reference implementation of bls signature scheme☆14Updated 5 years ago
- Working Copy of the NSEC5 Specification☆15Updated 5 years ago
- Stronger and Faster Side-Channel Protections for CSIDH☆20Updated 4 years ago
- supplement material for BlackHat2020 talk: Multiple Bugs in Multi-Party Computation: Breaking Cryptocurrency's Strongest Wallets☆12Updated 5 years ago