gherynos / secreteLinks
ECIES implementation with Curve25519.
☆16Updated 7 months ago
Alternatives and similar repositories for secrete
Users that are interested in secrete are comparing it to the libraries listed below
Sorting:
- Deterministic/nonce-reuse resistant authenticated encryption scheme using XChaCha20, implemented on libsodium.☆30Updated last year
- Curve25519 ECIES☆10Updated 9 years ago
- ☆19Updated 5 years ago
- ☆18Updated 2 years ago
- Simple ECIES, ECDSA and AES library for Python, supporting OpenSSL and pure-Python environments☆26Updated 5 years ago
- Auditing Applied Cryptography☆11Updated 6 years ago
- Results of a recent FOIA for NIST documents related to the design of Dual EC DRBG. Via EFF and Rep. Grayson's office. See README for deta…☆24Updated 11 years ago
- Pure Java implementation of Ed25519☆21Updated 2 years ago
- Implementation and simulations for the "Reducing Metadata Leakage from Encrypted Data and Communication with PURBs" paper☆31Updated 2 years ago
- Zcash Sapling Paper Wallet Generator☆44Updated last year
- Blind RSA signatures for OpenSSL/BoringSSL.☆17Updated last week
- Collection of open-source JavaCard crypto algorithms. Optimized for memory and speed with unified interface☆13Updated last year
- A standalone AES-KW (AES Key Wrap) implementation.☆14Updated 2 years ago
- Oblivious Pseudorandom Functions (OPRFs) using Prime-Order Groups☆38Updated last year
- Hybrid Public Key Encryption☆51Updated last year
- Mirror of all PDFs from the IACR's eprint☆48Updated 2 years ago
- Xoodyak, a lightweight and versatile cryptographic scheme implemented in Rust.☆30Updated 9 months ago
- A library for peer discovery inside the Tor network☆28Updated last year
- a Tahoe-LAFS storage-system plugin which authorizes storage operations based on privacy-respecting tokens☆10Updated 8 months ago
- Pure Java implementation of group operations on ristretto255 and Curve25519☆30Updated 2 years ago
- Linkable ring signature library☆25Updated 2 years ago
- APRICOT: Advanced Protocols for Real-world Implementation of Computational Oblivious Transfers☆16Updated 9 years ago
- ECIES implemented in Go☆31Updated 6 years ago
- Java implementation of the authenticated encryption algorithm Ascon☆17Updated 2 years ago
- ☆10Updated 3 years ago
- A memory-hard password hashing function.☆71Updated 2 years ago
- Provider library - a library of small helpers. These may or may not become part of OpenSSL at some point☆12Updated 8 months ago
- Working Copy of the NSEC5 Specification☆15Updated 5 years ago
- ☆23Updated 5 years ago
- Resolver implementation☆27Updated 6 years ago