google / anonymous-counting-tokensLinks
☆20Updated last year
Alternatives and similar repositories for anonymous-counting-tokens
Users that are interested in anonymous-counting-tokens are comparing it to the libraries listed below
Sorting:
- ☆57Updated 2 weeks ago
- A collection of high-performance crypto implementations.☆52Updated 4 months ago
- A cache hard password hash/KDF☆48Updated last year
- I-D that describes the algorithm identifiers for NIST's PQC ML-DSA for use in the Internet X.509 Public Key Infrastructure☆13Updated last week
- A tiny, portable implementation of the IPCrypt specification in C.☆23Updated this week
- Always up-to-date mirror of the SUPERCOP cryptographic benchmark.☆32Updated 5 months ago
- Community Cryptography Test Vectors☆84Updated 4 months ago
- Rust tools for working with UEFI SBAT☆16Updated 2 weeks ago
- Open Cryptanalysis Platform☆10Updated last week
- INACTIVE - A C library implementing a basic version of the Prio system for private aggregation. https://crypto.stanford.edu/prio/☆79Updated 4 years ago
- Lean cryptographic library usable for bare-metal environments☆64Updated this week
- Generic Low Overhead Message Exchange (GLOME) is a protocol providing secure authentication and authorization for low dependency environm…☆63Updated 2 months ago
- VDAF specification☆23Updated last week
- ☆108Updated 3 weeks ago
- BAT KEM/Signature Reference Implementation☆22Updated 3 years ago
- C++ implementation of Tink☆83Updated last week
- This document describes the Distributed Aggregation Protocol (DAP) being developed by the PPM working group at IETF.☆50Updated 2 weeks ago
- A tweakable block cipher☆31Updated last year
- XKCP-extracted code for KangarooTwelve (K12)☆48Updated 3 weeks ago
- Bertie TLS 1.3 Implementation☆125Updated 3 months ago
- The OPAQUE Asymmetric PAKE Protocol☆110Updated 7 months ago
- HCTR2 specification and test vectors☆36Updated 7 months ago
- A suite of testvectors for X.509 certificate path validation and tools for building them☆54Updated this week
- ☆28Updated 3 years ago
- A Zig implementation of EdDSA signatures with blind keys.☆17Updated 2 years ago
- Portable C implementations of the AEGIS family of high-performance authenticated encryption algorithms.☆97Updated last week
- The AEGIS-128X and AEGIS-256X high performance ciphers.☆37Updated 9 months ago
- The formally verified crypto library for Rust☆157Updated this week
- Formal Analysis of the PQXDH Protocol☆26Updated last year
- Verifying constant-time code with symbolic execution☆44Updated 3 years ago