gherynos / secreteLinks
ECIES implementation with Curve25519.
☆16Updated 4 months ago
Alternatives and similar repositories for secrete
Users that are interested in secrete are comparing it to the libraries listed below
Sorting:
- Curve25519 ECIES☆10Updated 9 years ago
- Deterministic/nonce-reuse resistant authenticated encryption scheme using XChaCha20, implemented on libsodium.☆30Updated last year
- libsodium-jna is a java library that binds to libsodium C crypto APIs with Java Native Access (JNA)☆54Updated last year
- Simple ECIES, ECDSA and AES library for Python, supporting OpenSSL and pure-Python environments☆26Updated 4 years ago
- ☆23Updated 5 years ago
- a Tahoe-LAFS storage-system plugin which authorizes storage operations based on privacy-respecting tokens☆10Updated 5 months ago
- ☆18Updated last year
- A privacy-preserving digital version of punch cards used in store loyalty programs☆11Updated 4 years ago
- Blind RSA signatures for OpenSSL/BoringSSL.☆17Updated last year
- AppCoins is a blockchain-based protocol for the App Economy supported by the Aptoide App Store, and the first ICO serving 200 million us…☆11Updated 7 years ago
- Results of a recent FOIA for NIST documents related to the design of Dual EC DRBG. Via EFF and Rep. Grayson's office. See README for deta…☆24Updated 10 years ago
- Xoodyak, a lightweight and versatile cryptographic scheme implemented in Rust.☆30Updated 5 months ago
- Pure Java implementation of curve25519, salsa20, hsalsa20, xsalsa20 and poly1305 cryptographic primitives, along with a NaCl "Box" implem…☆111Updated 2 years ago
- Provider library - a library of small helpers. These may or may not become part of OpenSSL at some point☆12Updated 5 months ago
- Stronger and Faster Side-Channel Protections for CSIDH☆20Updated 4 years ago
- Pure Java implementation of Ed25519☆20Updated 2 years ago
- Proof of Device☆21Updated 2 years ago
- ☆10Updated 3 years ago
- wolfSSL JSSE provider and JNI wrapper for SSL/TLS, supporting up to TLS 1.3!☆67Updated this week
- Pointcheval Sanders signature☆27Updated 5 years ago
- Reference implementations of post-quantum cryptographic primitives☆32Updated last month
- ☆19Updated 5 years ago
- 🚧 WIP: tor transport for libp2p☆56Updated 2 years ago
- Linkable ring signature library☆24Updated 2 years ago
- Multi-Server PIR (CCSW'14)☆11Updated 4 years ago
- Algorand's reference implementation of bls signature scheme☆14Updated 5 years ago
- Auditing Applied Cryptography☆11Updated 6 years ago
- Overlay Network for distributed protocols☆51Updated 2 years ago
- O(1) Cryptography is an easy to use, hard to misuse Java cryptographic library based on O(1) cryptographic algorithms☆15Updated 3 years ago
- Quick-n-dirty standalone Java implementation of ChaCha20 (256-bit key, 64- or 96-bit nonce)☆22Updated 5 years ago