gustin / opaque
OPAQUE protocol, a secure asymmetric password authenticated key exchange (aPAKE) that supports mutual authentication in a client-server setting without reliance on PKI and with security against pre-computation attacks upon server compromise.
☆75Updated 3 years ago
Alternatives and similar repositories for opaque:
Users that are interested in opaque are comparing it to the libraries listed below
- The OPAQUE Asymmetric PAKE Protocol☆102Updated 2 weeks ago
- Rust library for cryptographic research☆138Updated last month
- c implementation of the OPAQUE protocol with bindings for python, php, ruby, lua, zig, java, erlang, golang, js and SASL. also supports a…☆72Updated last month
- Deployments of fancy cryptography☆134Updated last month
- Community Cryptography Test Vectors☆71Updated 3 weeks ago
- ☆39Updated 3 years ago
- The formally verified crypto library for Rust☆102Updated this week
- library providing OPRF and Threshold OPRF based on libsodium☆21Updated 3 weeks ago
- An implementation of a verifiable oblivious pseudorandom function (RFC 9497)☆60Updated 2 weeks ago
- Pure Rust implementation of HPKE (https://www.rfc-editor.org/rfc/rfc9180.html)☆33Updated 5 months ago
- Experimental implementation of KEMTLS in Rustls☆29Updated last year
- SQISign: Short Quaternion and Isogeny Signature – C implementation based on PARI/GP (obsolete implementation)☆27Updated last year
- A safe pure-rust implementation of the NTRU post-quantum scheme.☆20Updated 2 years ago
- Oblivious Pseudorandom Functions (OPRFs) using Prime-Order Groups☆39Updated 5 months ago
- Bertie TLS 1.3 Implementation☆118Updated this week
- Rust source code for the FrodoPIR Private Information Retrieval scheme.☆61Updated last year
- Hashing to Elliptic Curves☆81Updated 5 months ago
- ☆11Updated last year
- An Rust implementation of FROST: Flexible Round-Optimised Schnorr Threshold signatures using the Ristretto group☆67Updated 3 years ago
- FN-DSA (Falcon) signature scheme☆35Updated 3 weeks ago
- Exploration of NIST post-quantum signatures on-ramp candidates☆25Updated last month
- Curve ecGFp5☆68Updated 2 years ago
- A collection of high-performance crypto implementations.☆45Updated 2 weeks ago
- Formal Analysis of the PQXDH Protocol☆25Updated 8 months ago
- Coordination of implementation and interop specific details☆113Updated 7 months ago
- Passive-Swoosh: Practical Lattice-Based Non-Interactive Key Exchange☆27Updated 8 months ago
- toy implementation of bfv in rust☆26Updated 2 years ago
- An efficient and generalized implementation of the IKOS-style KKW proof system (https://eprint.iacr.org/2018/475) for arbitrary rings.☆61Updated last year
- A maliciously secure two-party computation engine which is embeddable and accessible☆182Updated this week
- FourQlib is an efficient and portable cryptographic library that provides functions for computing elliptic curve based operations on the …☆82Updated 2 years ago