gherynos / secrete
ECIES implementation with Curve25519.
☆16Updated 7 months ago
Alternatives and similar repositories for secrete
Users that are interested in secrete are comparing it to the libraries listed below
Sorting:
- Deterministic/nonce-reuse resistant authenticated encryption scheme using XChaCha20, implemented on libsodium.☆29Updated 9 months ago
- Curve25519 ECIES☆10Updated 8 years ago
- Blind RSA signatures for OpenSSL/BoringSSL.☆17Updated last year
- ☆21Updated 4 years ago
- Private Internet Access - OpenVPN for Android VPN Client☆11Updated last year
- Simple ECIES, ECDSA and AES library for Python, supporting OpenSSL and pure-Python environments☆27Updated 4 years ago
- ☆18Updated last year
- Pure Java implementation of Ed25519☆19Updated 2 years ago
- ☆19Updated 4 years ago
- TLS WG Wiki☆13Updated 4 months ago
- Auditing Applied Cryptography☆10Updated 5 years ago
- A standalone AES-KW (AES Key Wrap) implementation.☆14Updated last year
- ☆12Updated 4 years ago
- Java implementation of multiaddr☆16Updated 2 weeks ago
- Communications layer used for both the Oxen storage server and oxend☆19Updated 3 weeks ago
- Updated! (Dec2-2019) This is a C-language software library that provides optimized implementations of the Diffie-Hellman functions known …☆44Updated last year
- ☆9Updated 2 years ago
- Deoxys-II-256-128 MRAE primitives for Rust☆24Updated last year
- VDAF specification☆23Updated this week
- ☆10Updated 3 years ago
- Distinguisher of Standard & Simulated Elliptic Curves via Traits.☆18Updated 10 months ago
- Working Copy of the NSEC5 Specification☆15Updated 4 years ago
- An implementation of go-libp2p-interface-pnet☆12Updated 2 years ago
- Readable Implementation of Strobe in Go☆25Updated 3 years ago
- A library for peer discovery inside the Tor network☆27Updated last year
- Implements uTP, the micro transport protocol as used with Bittorrent☆10Updated 8 years ago
- Audit Proposals and Reports for RandomX☆12Updated 5 years ago
- Implementation and simulations for the "Reducing Metadata Leakage from Encrypted Data and Communication with PURBs" paper☆30Updated last year
- cgo wrappers around post-quantum cryptography primitives☆23Updated 6 years ago
- a Tahoe-LAFS storage-system plugin which authorizes storage operations based on privacy-respecting tokens☆10Updated this week