gherynos / secrete
ECIES implementation with Curve25519.
☆16Updated 6 months ago
Alternatives and similar repositories for secrete:
Users that are interested in secrete are comparing it to the libraries listed below
- Curve25519 ECIES☆10Updated 8 years ago
- Deterministic/nonce-reuse resistant authenticated encryption scheme using XChaCha20, implemented on libsodium.☆29Updated 8 months ago
- A standalone AES-KW (AES Key Wrap) implementation.☆13Updated last year
- Blind RSA signatures for OpenSSL/BoringSSL.☆17Updated 11 months ago
- Elliptic curve Go reference implementation☆26Updated 2 months ago
- ☆18Updated last year
- Auditing Applied Cryptography☆10Updated 5 years ago
- ☆19Updated 4 years ago
- Simple ECIES, ECDSA and AES library for Python, supporting OpenSSL and pure-Python environments☆27Updated 4 years ago
- Pure Java implementation of Ed25519☆19Updated 2 years ago
- Updated! (Dec2-2019) This is a C-language software library that provides optimized implementations of the Diffie-Hellman functions known …☆44Updated last year
- dalek-compatible implementation of the merlin transcript protocol☆27Updated 5 years ago
- A privacy-preserving digital version of punch cards used in store loyalty programs☆10Updated 4 years ago
- Faster Montgomery and Joye ladder formulas for short Weierstrass elliptic curves☆20Updated 4 years ago
- A library for peer discovery inside the Tor network☆27Updated last year
- ☆11Updated last year
- Working Copy of the NSEC5 Specification☆15Updated 4 years ago
- Wrapper of the OpenSSL elliptic curve functions for easy Python manipulation☆12Updated 10 years ago
- Readable Implementation of Strobe in Go☆25Updated 3 years ago
- An experimental library for PDP and POR☆29Updated 4 years ago
- Elliptic curves Rust reference implementation☆16Updated last year
- AppCoins is a blockchain-based protocol for the App Economy supported by the Aptoide App Store, and the first ICO serving 200 million us…☆11Updated 6 years ago
- A golang implementation of Ed448-Goldilocks. This is a mirror of https://bugs.otr.im/otrv4/ed448☆40Updated 2 years ago
- Challenge Bypass using the Ristretto group☆35Updated this week
- ☆9Updated 2 years ago
- (Oblivious) DoH Server☆26Updated 3 years ago
- one of many proofs, ring signatures, and zerocoin algo from https://eprint.iacr.org/2014/764.pdf☆15Updated 2 years ago
- Pure Java implementation of group operations on ristretto255 and Curve25519☆27Updated 2 years ago
- wolfSSL JSSE provider and JNI wrapper for SSL/TLS, supporting up to TLS 1.3!☆65Updated last month
- Deterministic And Verifiable Randomness On Schnorr signatures☆13Updated 7 years ago