google / adiantumLinks
Adiantum and HPolyC specification and test vectors
☆477Updated last year
Alternatives and similar repositories for adiantum
Users that are interested in adiantum are comparing it to the libraries listed below
Sorting:
- SIDH Library is a fast and portable software library that implements state-of-the-art supersingular isogeny cryptographic schemes. The ch…☆325Updated 2 years ago
- ☆471Updated last year
- TLS 1.3 Specification☆574Updated 3 weeks ago
- DEPRECATED Krypton turns your Android device into a U2F Authenticator: strong, unphishable 2FA.☆201Updated 2 years ago
- Constant-Time Toolkit☆300Updated 7 years ago
- eXtended Keccak Code Package☆631Updated 2 months ago
- BLAKE2 official implementations☆683Updated 2 years ago
- AES-GCM-SIV implementations (128 and 256 bit)☆117Updated 6 years ago
- Repo for DTLS 1.3☆32Updated last month
- ☆100Updated 9 years ago
- Noise Specification☆459Updated 7 years ago
- Understand and mitigate software-observable side-channels☆505Updated 4 years ago
- Noise-C, a plain C implementation of the Noise protocol☆350Updated last year
- Reference implementation of the Picnic post-quantum signature scheme☆167Updated 2 years ago
- A reversible DER and BER pretty-printer.☆247Updated last month
- Gitbook documentation for libsodium☆175Updated 3 weeks ago
- A party game for nerdy cryptographers. Shamelessly based on Cards Against Humanity.☆323Updated 5 years ago
- BetterTLS: A Name Constraints test suite for HTTPS clients.☆173Updated last month
- Jitterentropy Library☆129Updated 3 weeks ago
- Cryptographic library☆834Updated last week
- Tools for dealing with Chrome's CRLSets☆148Updated 2 months ago
- The scrypt key derivation function was originally developed for use in the Tarsnap online backup system and is designed to be far more se…☆508Updated 9 months ago
- Guidelines for low-level cryptography software☆1,177Updated 2 years ago
- Implementations of a fast Elliptic-curve Diffie-Hellman primitive☆340Updated 3 years ago
- UAF - Universal Authentication Framework☆287Updated last year
- An open and flexible framework for developing enclave applications☆981Updated 3 years ago
- Sphinx-based Password Storage low-level library☆129Updated 10 months ago
- MLS protocol☆241Updated last year
- ☆281Updated 2 years ago
- Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS☆120Updated 8 years ago