gherynos / secreteLinks
ECIES implementation with Curve25519.
☆16Updated 6 months ago
Alternatives and similar repositories for secrete
Users that are interested in secrete are comparing it to the libraries listed below
Sorting:
- Simple ECIES, ECDSA and AES library for Python, supporting OpenSSL and pure-Python environments☆26Updated 5 years ago
- Deterministic/nonce-reuse resistant authenticated encryption scheme using XChaCha20, implemented on libsodium.☆30Updated last year
- Pure Java implementation of Ed25519☆21Updated 2 years ago
- ☆19Updated 5 years ago
- Blind RSA signatures for OpenSSL/BoringSSL.☆17Updated 2 months ago
- Results of a recent FOIA for NIST documents related to the design of Dual EC DRBG. Via EFF and Rep. Grayson's office. See README for deta…☆24Updated 10 years ago
- Audit Proposals and Reports for RandomX☆12Updated 6 years ago
- A privacy-preserving digital version of punch cards used in store loyalty programs☆11Updated 4 years ago
- a Tahoe-LAFS storage-system plugin which authorizes storage operations based on privacy-respecting tokens☆10Updated 7 months ago
- Linkable ring signature library☆25Updated 2 years ago
- ☆10Updated 3 years ago
- ☆23Updated 5 years ago
- ☆18Updated 2 years ago
- wolfSSL JSSE provider and JNI wrapper for SSL/TLS, supporting up to TLS 1.3!☆67Updated this week
- Provider library - a library of small helpers. These may or may not become part of OpenSSL at some point☆12Updated 7 months ago
- Java implementation of multiaddr☆16Updated last month
- AppCoins is a blockchain-based protocol for the App Economy supported by the Aptoide App Store, and the first ICO serving 200 million us…☆11Updated 7 years ago
- ECIES implemented in Go☆31Updated 6 years ago
- A library for peer discovery inside the Tor network☆28Updated last year
- Auditing Applied Cryptography☆11Updated 6 years ago
- Pure Java implementation of group operations on ristretto255 and Curve25519☆28Updated 2 years ago
- Compact Proofs of Retrievability☆14Updated 11 years ago
- A Shadow plug-in that runs the Bitcoin Satoshi reference software☆25Updated 5 years ago
- C bindings over RUST sr25519 https://github.com/w3f/schnorrkel☆31Updated 3 years ago
- Specifications for Privacy Proxy Implementations☆32Updated last month
- Elliptic curve Go reference implementation☆26Updated 10 months ago
- A Java implementation of Multihash☆51Updated last month
- Implementation and simulations for the "Reducing Metadata Leakage from Encrypted Data and Communication with PURBs" paper☆31Updated 2 years ago
- SDK for social seed recovery☆15Updated 6 years ago
- O(1) Cryptography is an easy to use, hard to misuse Java cryptographic library based on O(1) cryptographic algorithms☆15Updated 3 years ago