gherynos / secreteLinks
ECIES implementation with Curve25519.
☆16Updated 3 months ago
Alternatives and similar repositories for secrete
Users that are interested in secrete are comparing it to the libraries listed below
Sorting:
- Deterministic/nonce-reuse resistant authenticated encryption scheme using XChaCha20, implemented on libsodium.☆30Updated last year
- Curve25519 ECIES☆10Updated 8 years ago
- libsodium-jna is a java library that binds to libsodium C crypto APIs with Java Native Access (JNA)☆52Updated last year
- ☆23Updated 5 years ago
- Pure Java implementation of group operations on ristretto255 and Curve25519☆28Updated 2 years ago
- Pointcheval Sanders signature☆27Updated 5 years ago
- Simple ECIES, ECDSA and AES library for Python, supporting OpenSSL and pure-Python environments☆26Updated 4 years ago
- A privacy-preserving digital version of punch cards used in store loyalty programs☆11Updated 4 years ago
- Blind RSA signatures for OpenSSL/BoringSSL.☆17Updated last year
- ☆18Updated last year
- Pure Java implementation of Ed25519☆20Updated 2 years ago
- ☆19Updated 5 years ago
- ☆10Updated 3 years ago
- a Tahoe-LAFS storage-system plugin which authorizes storage operations based on privacy-respecting tokens☆10Updated 4 months ago
- AppCoins is a blockchain-based protocol for the App Economy supported by the Aptoide App Store, and the first ICO serving 200 million us…☆11Updated 7 years ago
- Linkable ring signature library☆24Updated 2 years ago
- Compact Proofs of Retrievability☆14Updated 11 years ago
- Results of a recent FOIA for NIST documents related to the design of Dual EC DRBG. Via EFF and Rep. Grayson's office. See README for deta…☆24Updated 10 years ago
- Auditing Applied Cryptography☆10Updated 6 years ago
- Xoodyak, a lightweight and versatile cryptographic scheme implemented in Rust.☆30Updated 5 months ago
- Stronger and Faster Side-Channel Protections for CSIDH☆19Updated 4 years ago
- Implementation and simulations for the "Reducing Metadata Leakage from Encrypted Data and Communication with PURBs" paper☆30Updated last year
- ☆13Updated 3 weeks ago
- Hybrid Public Key Encryption☆51Updated last year
- A golang implementation of Ed448-Goldilocks. This is a mirror of https://bugs.otr.im/otrv4/ed448☆40Updated 2 years ago
- A library for peer discovery inside the Tor network☆28Updated last year
- A standalone AES-KW (AES Key Wrap) implementation.☆14Updated last year
- C implementation of Elligator 2 for Curve25519☆30Updated 4 years ago
- Oblivious Pseudorandom Functions (OPRFs) using Prime-Order Groups☆38Updated last year
- Audit Proposals and Reports for RandomX☆12Updated 6 years ago