google / adiantumLinks
Adiantum and HPolyC specification and test vectors
☆477Updated last year
Alternatives and similar repositories for adiantum
Users that are interested in adiantum are comparing it to the libraries listed below
Sorting:
- TLS 1.3 Specification☆575Updated last month
- DEPRECATED Krypton turns your Android device into a U2F Authenticator: strong, unphishable 2FA.☆201Updated 2 years ago
- SIDH Library is a fast and portable software library that implements state-of-the-art supersingular isogeny cryptographic schemes. The ch…☆325Updated 2 years ago
- Constant-Time Toolkit☆301Updated 7 years ago
- ☆473Updated last year
- Noise Specification☆460Updated 7 years ago
- Understand and mitigate software-observable side-channels☆506Updated 5 years ago
- A reversible DER and BER pretty-printer.☆248Updated 3 months ago
- Repo for DTLS 1.3☆32Updated 3 months ago
- Tools for dealing with Chrome's CRLSets☆149Updated 4 months ago
- Noise-C, a plain C implementation of the Noise protocol☆358Updated last year
- Gitbook documentation for libsodium☆177Updated 2 weeks ago
- PKCS#11 Test Suite☆81Updated 2 years ago
- AES-GCM-SIV implementations (128 and 256 bit)☆118Updated 6 years ago
- Off-the-Record Messaging Protocol version 4. -This is a draft- This repository is a mirror of http://bugs.otr.im/otrv4/otrv4☆192Updated 3 years ago
- Auditing for TLS certificates.☆886Updated 2 years ago
- Cryptographic library☆842Updated 2 months ago
- MLS protocol☆240Updated last year
- Simple Linux seccomp rules without writing any code☆516Updated 7 months ago
- eXtended Keccak Code Package☆636Updated last month
- Post-quantum Cryptography VPN☆350Updated 2 years ago
- BetterTLS: A Name Constraints test suite for HTTPS clients.☆176Updated 3 weeks ago
- Implementations of a fast Elliptic-curve Diffie-Hellman primitive☆342Updated 4 years ago
- ☆100Updated 9 years ago
- Sphinx-based Password Storage low-level library☆129Updated last year
- A really tiny crypto library.☆165Updated last month
- Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS☆119Updated 8 years ago
- Abandoned—Virtual FIDO U2F Token Chrome Extension☆62Updated 10 years ago
- ☆281Updated 2 years ago
- Memory-hard scheme Argon2☆207Updated 5 years ago