gherynos / secrete
ECIES implementation with Curve25519.
☆15Updated 5 months ago
Alternatives and similar repositories for secrete:
Users that are interested in secrete are comparing it to the libraries listed below
- Deterministic/nonce-reuse resistant authenticated encryption scheme using XChaCha20, implemented on libsodium.☆29Updated 7 months ago
- Curve25519 ECIES☆10Updated 8 years ago
- Pure Java implementation of Ed25519☆19Updated 2 years ago
- ☆18Updated last year
- ☆19Updated 4 years ago
- Readable Implementation of Strobe in Go☆25Updated 3 years ago
- Blind RSA signatures for OpenSSL/BoringSSL.☆17Updated 10 months ago
- Simple ECIES, ECDSA and AES library for Python, supporting OpenSSL and pure-Python environments☆27Updated 4 years ago
- A library for peer discovery inside the Tor network☆27Updated 11 months ago
- A standalone AES-KW (AES Key Wrap) implementation.☆13Updated last year
- ☆11Updated last year
- Auditing Applied Cryptography☆10Updated 5 years ago
- A rust implementation of Verifiable Secret Sharing over Finite Field.☆42Updated 4 years ago
- BAT KEM/Signature Reference Implementation☆21Updated 3 years ago
- ☆9Updated 2 years ago
- Pure Java implementation of group operations on ristretto255 and Curve25519☆27Updated last year
- A privacy-preserving digital version of punch cards used in store loyalty programs☆10Updated 3 years ago
- Reference implementations of post-quantum cryptographic primitives☆29Updated last year
- ☆12Updated 4 years ago
- Implementations of a fast Elliptic-curve Diffie-Hellman primitive☆25Updated 9 years ago
- a Tahoe-LAFS storage-system plugin which authorizes storage operations based on privacy-respecting tokens☆10Updated 3 months ago
- O(1) Cryptography is an easy to use, hard to misuse Java cryptographic library based on O(1) cryptographic algorithms☆16Updated 2 years ago
- Wrapper of the OpenSSL elliptic curve functions for easy Python manipulation☆12Updated 10 years ago
- ☆10Updated 3 years ago
- Implementation and simulations for the "Reducing Metadata Leakage from Encrypted Data and Communication with PURBs" paper☆30Updated last year
- An implementation of go-libp2p-interface-pnet☆12Updated 2 years ago
- Oblivious Pseudorandom Functions (OPRFs) using Prime-Order Groups☆39Updated 6 months ago
- Communications layer used for both the Oxen storage server and oxend☆19Updated last week
- HElib is an open-source software library that implements homomorphic encryption. It supports the BGV scheme with bootstrapping and the Ap…☆21Updated 3 years ago
- An Internet-Draft for the Balloon Key Derivation Function (BKDF), a memory-hard password hashing and password-based key derivation functi…☆11Updated this week