Signcryption using libsodium.
☆69Jan 1, 2026Updated 2 months ago
Alternatives and similar repositories for libsodium-signcryption
Users that are interested in libsodium-signcryption are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Deterministic/nonce-reuse resistant authenticated encryption scheme using XChaCha20, implemented on libsodium.☆31Aug 5, 2024Updated last year
- A CPace PAKE implementation using libsodium.☆40Dec 31, 2020Updated 5 years ago
- ☆12Sep 23, 2021Updated 4 years ago
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆28Apr 20, 2018Updated 7 years ago
- A really tiny crypto library.☆165Dec 26, 2025Updated 3 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A Zig implementation of EdDSA signatures with blind keys.☆17Jul 15, 2023Updated 2 years ago
- ☆19Nov 22, 2025Updated 4 months ago
- Easily route mdm streams☆20Aug 14, 2012Updated 13 years ago
- Python library for vectorial Boolean functions in cryptography☆11Nov 15, 2023Updated 2 years ago
- C++ STL for speed and cryptanalytic application☆11Dec 16, 2025Updated 3 months ago
- Tool and library for generating X.509 certificates and certificate requests (mirror)☆16Mar 19, 2026Updated last week
- [RFC9380] Hash to curves - Rust reference implementation☆27Mar 10, 2024Updated 2 years ago
- AEGIS-256☆11Apr 17, 2022Updated 3 years ago
- Basis Reduction Algorithms for Codes (LLL and more)☆28Feb 27, 2024Updated 2 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- An implementation of the OPAQUE key exchange protocol in WASM☆23Feb 17, 2024Updated 2 years ago
- Implementation of cryptographic primitives in Go☆13Mar 13, 2023Updated 3 years ago
- Xoocycle, a C90 implementation of the Xoodyak hash and AEAD construction☆10Mar 28, 2019Updated 6 years ago
- Models for authenticated key exchange in Tamarin☆12Oct 9, 2019Updated 6 years ago
- Implements Coron's simplification of Coppersmith's algorithm☆10May 28, 2017Updated 8 years ago
- cryptographic library for ed25519 and curve25519☆25Nov 14, 2023Updated 2 years ago
- Example code you can run in Fastly Terrarium: https://www.fastlylabs.com/☆30Mar 21, 2019Updated 7 years ago
- FreeBSD Device Tree Compiler☆21Jun 16, 2025Updated 9 months ago
- Hybrid Public Key Encryption☆51Jul 10, 2024Updated last year
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Cryptographic operations in WASM, C, Typescript for Nodejs and the browser.☆29Nov 30, 2023Updated 2 years ago
- A generic and efficient SIMD implementation of MSB Radix Sort with separate key and payload datastreams that supports arbitrary key and p…☆14Jan 31, 2025Updated last year
- Implementation and simulations for the "Reducing Metadata Leakage from Encrypted Data and Communication with PURBs" paper☆30Oct 26, 2023Updated 2 years ago
- [work in progress] Python framework for supporting cryptographic game-hopping proofs☆13Oct 19, 2022Updated 3 years ago
- write c++ like python☆12Sep 25, 2023Updated 2 years ago
- The dum^H^H^Hsimplest encryption tool in the world.☆233Sep 19, 2025Updated 6 months ago
- Rust bindings for HACL & Evercrypt☆30Apr 24, 2025Updated 11 months ago
- Lecture notes on the Foundations of Isogeny-based Cryptography☆33Sep 5, 2024Updated last year
- FIPS-204 (ML-DSA) implementation in Go☆19Feb 13, 2026Updated last month
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- C crypto library☆25Aug 2, 2023Updated 2 years ago
- materialized view to calculate back-references for unordered log messages☆10Jun 18, 2019Updated 6 years ago
- Implicit White-box Implementations of ARX Ciphers☆16Nov 16, 2022Updated 3 years ago
- An implementation of Mike Hamburg's Ed448 (Goldilocks) curve - derived from libdecaf. This is a mirror of https://bugs.otr.im/otrv4/libgo…☆19Mar 16, 2020Updated 6 years ago
- ☆16Jun 24, 2024Updated last year
- Microbenchmarks for x86_64 kernel entry methods☆20Feb 21, 2022Updated 4 years ago
- A full-featured implementation of of the LMS and HSS Hash Based Signature Schemes from draft-mcgrew-hash-sigs-07.☆50Aug 6, 2025Updated 7 months ago