jedisct1 / libsodium-xchacha20-sivLinks
Deterministic/nonce-reuse resistant authenticated encryption scheme using XChaCha20, implemented on libsodium.
☆29Updated 10 months ago
Alternatives and similar repositories for libsodium-xchacha20-siv
Users that are interested in libsodium-xchacha20-siv are comparing it to the libraries listed below
Sorting:
- Elliptic curves Rust reference implementation☆16Updated last year
- Implementation and simulations for the "Reducing Metadata Leakage from Encrypted Data and Communication with PURBs" paper☆30Updated last year
- Xoodyak, a lightweight and versatile cryptographic scheme implemented in Rust.☆30Updated last month
- ☆12Updated last year
- ☆18Updated last year
- Updated! (Dec2-2019) This is a C-language software library that provides optimized implementations of the Diffie-Hellman functions known …☆44Updated last year
- ☆19Updated 4 years ago
- BAT KEM/Signature Reference Implementation☆22Updated 3 years ago
- Proof-of-concept implementation of the (V)OPRF protocol in https://datatracker.ietf.org/doc/draft-irtf-cfrg-voprf/☆23Updated 4 years ago
- Reference implementations of post-quantum cryptographic primitives☆29Updated last year
- An Internet-Draft for the Balloon Key Derivation Function (BKDF), a memory-hard password hashing and password-based key derivation functi…☆10Updated 2 months ago
- Implementation of cryptographic primitives in Go☆12Updated 2 years ago
- A simple proof of work, mainly designed to mitigate DDoS attacks.☆25Updated 4 years ago
- Always up-to-date mirror of the SUPERCOP cryptographic benchmark.☆30Updated last month
- Implementations of do255e and do255s in C and assembly☆25Updated 4 years ago
- XChaCha8Blake3Siv is a nonce-reuse misuse-resistant (NRMR) and key-committing authenticated encryption with associated data (AEAD) algori…☆17Updated 3 years ago
- This software library is a C-language + optimized assembly code that supports an instance of the Super-Singular Isogeny Diffie-Hellman (S…☆9Updated 6 years ago
- Auditing Applied Cryptography☆10Updated 5 years ago
- Stronger and Faster Side-Channel Protections for CSIDH☆19Updated 4 years ago
- Differential fuzzing for elliptic curves☆23Updated last year
- Deterministic And Verifiable Randomness On Schnorr signatures☆13Updated 7 years ago
- A tool for linear and differential cryptanalysis of block ciphers written in Rust☆13Updated 2 years ago
- A tiny C cryptographic library to encrypt sessions, authenticate messages, sign, hash, etc. based only on SHA-3 and Curve25519☆69Updated 4 years ago
- Blind RSA signatures for OpenSSL/BoringSSL.☆17Updated last year
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆28Updated 7 years ago
- Verifying constant-time code with symbolic execution☆44Updated 3 years ago
- HILA5 KEM/DEM. Reference and Optimized Implementations + NIST PQC Submission Documents☆16Updated 7 years ago
- (Oblivious) DoH Server☆26Updated 3 years ago
- A pure-Rust implementation of group operations on Ristretto and Curve25519☆28Updated 9 months ago
- An AES-based 384 bit permutation.☆20Updated last month