google / adiantumLinks
Adiantum and HPolyC specification and test vectors
☆477Updated last year
Alternatives and similar repositories for adiantum
Users that are interested in adiantum are comparing it to the libraries listed below
Sorting:
- TLS 1.3 Specification☆575Updated last month
- ☆473Updated last year
- SIDH Library is a fast and portable software library that implements state-of-the-art supersingular isogeny cryptographic schemes. The ch…☆325Updated 2 years ago
- Noise Specification☆460Updated 7 years ago
- Constant-Time Toolkit☆301Updated 7 years ago
- DEPRECATED Krypton turns your Android device into a U2F Authenticator: strong, unphishable 2FA.☆201Updated 2 years ago
- An open and flexible framework for developing enclave applications☆983Updated 3 years ago
- AES-GCM-SIV implementations (128 and 256 bit)☆118Updated 6 years ago
- Noise-C, a plain C implementation of the Noise protocol☆358Updated last year
- Cryptographic library☆842Updated 2 months ago
- A set of FIDO2 / WebAuthn demo servers☆358Updated 4 years ago
- eXtended Keccak Code Package☆636Updated last month
- The W3C Web Cryptography API☆285Updated last week
- PKCS#11 Test Suite☆81Updated 2 years ago
- Tools for dealing with Chrome's CRLSets☆149Updated 4 months ago
- Repo for DTLS 1.3☆32Updated 3 months ago
- Implementations of a fast Elliptic-curve Diffie-Hellman primitive☆342Updated 4 years ago
- Off-the-Record Messaging Protocol version 4. -This is a draft- This repository is a mirror of http://bugs.otr.im/otrv4/otrv4☆192Updated 3 years ago
- ROCA: Infineon RSA key vulnerability☆492Updated 2 years ago
- Understand and mitigate software-observable side-channels☆506Updated 5 years ago
- ☆100Updated 9 years ago
- Supersingular Isogeny Diffie-Hellman in Go☆138Updated 6 years ago
- A reversible DER and BER pretty-printer.☆248Updated 3 months ago
- Memory-hard scheme Argon2☆207Updated 5 years ago
- U2F reference implementations☆589Updated 3 years ago
- Simple Linux seccomp rules without writing any code☆516Updated 7 months ago
- MLS protocol☆239Updated last year
- UAF - Universal Authentication Framework☆288Updated last year
- A party game for nerdy cryptographers. Shamelessly based on Cards Against Humanity.☆324Updated 5 years ago
- Library for elliptic curves cryptography☆262Updated 3 years ago