jedisct1 / zig-rocca-sLinks
An implementation of the ROCCA-S encryption scheme.
☆20Updated 8 months ago
Alternatives and similar repositories for zig-rocca-s
Users that are interested in zig-rocca-s are comparing it to the libraries listed below
Sorting:
- HPKE implementation for Zig.☆17Updated 4 months ago
- Argon2 key derivation function in zig.☆15Updated 3 years ago
- Charm implementation in JavaScript (TypeScript)☆15Updated 2 months ago
- A Zig implementation of EdDSA signatures with blind keys.☆17Updated 2 years ago
- ChaCha20Poly1305 and XChaCha20Poly1305 AEAD implementations☆16Updated 4 years ago
- ☆23Updated 2 months ago
- Sealed boxes implementation for Rust/WebAssembly.☆16Updated last year
- An AES-based 384 bit permutation.☆21Updated 2 months ago
- Implementation of https://www.ietf.org/archive/id/draft-denis-aegis-aead-00.html / https://competitions.cr.yp.to/round3/aegisv11.pdf☆13Updated 3 months ago
- Xoodyak, a lightweight and versatile cryptographic scheme implemented in Rust.☆30Updated 2 months ago
- A standalone AES-KW (AES Key Wrap) implementation.☆14Updated last year
- Make AES-GCM safe to use with random nonces, for any practical number of messages.☆18Updated last year
- Dependency manager for the Chaos language☆21Updated 4 years ago
- A DNS library for Rust.☆23Updated 3 months ago
- Library of common cryptographic algorithms and functions for Pony☆12Updated 3 weeks ago
- A tiny library to properly encrypt IP addresses.☆19Updated last month
- Experimental wasm linker☆43Updated 2 years ago
- Reference implementations of post-quantum cryptographic primitives☆29Updated last year
- Multi-threaded cross-platform HTTP/1.1 web server example in Zig.☆34Updated 4 years ago
- AES-GEM (AES Galois Extended Mode) implementation.☆13Updated 4 months ago
- Blind RSA signatures implementation for Zig.☆18Updated 9 months ago
- A compiler for secure multiparty computation☆50Updated 8 years ago
- Kitbag is a content-addressed versioned tree-structured graph-based datastore.☆14Updated 3 years ago
- Deterministic/nonce-reuse resistant authenticated encryption scheme using XChaCha20, implemented on libsodium.☆29Updated 11 months ago
- Online engine for reasoning about the Noise Protocol Framework.☆13Updated 8 months ago
- Specification for the AEGIS family of authenticated encryption algorithms.☆17Updated 2 months ago
- Specifications for Privacy Proxy Implementations☆31Updated this week
- A PoPuLaToR for a PeePhoLe opTimizeR☆12Updated 3 years ago
- Haraka is a secure and efficient short-input hash function.☆57Updated 7 years ago
- A tweakable block cipher☆31Updated last year