jedisct1 / go-hpke-compactLinks
A small and easy to use HPKE implementation in Go.
☆20Updated last year
Alternatives and similar repositories for go-hpke-compact
Users that are interested in go-hpke-compact are comparing it to the libraries listed below
Sorting:
- Hybrid Public Key Encryption☆51Updated last year
- ☆12Updated 4 years ago
- Implementation of draft-irtf-cfrg-hpke☆30Updated 2 years ago
- Proof-of-concept implementation of the (V)OPRF protocol in https://datatracker.ietf.org/doc/draft-irtf-cfrg-voprf/☆23Updated 5 years ago
- Readable Implementation of Strobe in Go☆26Updated 4 years ago
- High-performance Curve25519/ristretto255 for Go.☆77Updated 2 months ago
- ☆18Updated 2 years ago
- Implements ristretto255, a fast prime-order group.☆107Updated 5 months ago
- Go Ed25519 suitable for use in consensus-critical contexts.☆52Updated last year
- An EXPERIMENTAL implementation of the CPace PAKE, instantiated with the Ristretto255 group. In Rust☆17Updated 5 years ago
- OPAQUE asymmetric PAKE, and its threshold implementation. Experimental, not audited.☆17Updated 4 years ago
- Efficient Anonymous Tokens with Private Metadata Bit☆15Updated 2 years ago
- Oblivious Pseudorandom Functions (OPRFs) using Prime-Order Groups☆38Updated last year
- ☆14Updated 7 years ago
- Go Deoxys-II-256-128☆24Updated last year
- Elliptic curve Go reference implementation☆26Updated 11 months ago
- Implementation of cryptographic primitives in Go☆13Updated 2 years ago
- NIST P elliptic curves (re-exported from crypto/internal/nistec)☆52Updated 2 months ago
- Pointcheval Sanders signature☆27Updated 5 years ago
- Message Layer Security☆58Updated 4 years ago
- Implementation and simulations for the "Reducing Metadata Leakage from Encrypted Data and Communication with PURBs" paper☆31Updated 2 years ago
- A privacy-preserving digital version of punch cards used in store loyalty programs☆11Updated 4 years ago
- We implement Delegatable Anonymous Credentials using Mercurial Signatures☆21Updated 3 years ago
- Deterministic/nonce-reuse resistant authenticated encryption scheme using XChaCha20, implemented on libsodium.☆30Updated last year
- dalek-compatible implementation of the merlin transcript protocol☆28Updated 5 years ago
- Zero-related bugs in 4 BLS libs & standard draft,"splitting zero" attacks, $35000 award☆17Updated 4 years ago
- Parses https://eprint.iacr.org/eprint-bin/search.pl?last=365&title=1 and sends you an email with the latest papers☆15Updated 5 years ago
- Deterministic And Verifiable Randomness On Schnorr signatures☆13Updated 8 years ago
- [RFC9380] Hash to curves - Rust reference implementation☆28Updated last year
- ☆25Updated last year