jedisct1 / zig-rocca-sLinks
An implementation of the ROCCA-S encryption scheme.
☆20Updated 3 months ago
Alternatives and similar repositories for zig-rocca-s
Users that are interested in zig-rocca-s are comparing it to the libraries listed below
Sorting:
- Xoodyak, a lightweight and versatile cryptographic scheme implemented in Rust.☆30Updated 6 months ago
- An AES-based 384 bit permutation.☆21Updated 6 months ago
- ☆10Updated 9 months ago
- Multi-threaded cross-platform HTTP/1.1 web server example in Zig.☆34Updated 4 years ago
- Implementation of https://www.ietf.org/archive/id/draft-denis-aegis-aead-00.html / https://competitions.cr.yp.to/round3/aegisv11.pdf☆14Updated 7 months ago
- ☆25Updated 5 months ago
- A Zig implementation of EdDSA signatures with blind keys.☆17Updated 2 years ago
- A collection of high-performance crypto implementations.☆52Updated this week
- AES-GEM (AES Galois Extended Mode) implementation.☆13Updated 8 months ago
- A cache hard password hash/KDF☆48Updated last year
- An ENGINE gluing together OpenSSL and NaCl-derived crypto.☆18Updated 2 years ago
- A port of the Google Randen fast backtracking-resistant random generator to the C language.☆27Updated 7 years ago
- The AEGIS-128X and AEGIS-256X high performance ciphers.☆37Updated 10 months ago
- Blind RSA signatures implementation for Zig.☆19Updated last month
- A set of tools for generating signed exchanges at serve time.☆85Updated last year
- an authenticated, chunked cipher based on BLAKE3☆23Updated 6 months ago
- VDAF specification☆23Updated last week
- BAT KEM/Signature Reference Implementation☆23Updated 3 years ago
- Experimental committing AEAD designed by Soatok.☆10Updated 5 years ago
- Implementation and simulations for the "Reducing Metadata Leakage from Encrypted Data and Communication with PURBs" paper☆30Updated 2 years ago
- ☆14Updated 6 years ago
- C crypto library☆24Updated 2 years ago
- Library of common cryptographic algorithms and functions for Pony☆12Updated 3 months ago
- zig toml library☆12Updated 4 years ago
- Deterministic/nonce-reuse resistant authenticated encryption scheme using XChaCha20, implemented on libsodium.☆30Updated last year
- Experimental wasm linker☆43Updated 2 years ago
- HiAE - A High-Throughput Authenticated Encryption Algorithm for Cross-Platform Efficiency.☆18Updated 2 weeks ago
- naive dns client library in zig☆42Updated 6 months ago
- Specifications for Privacy Proxy Implementations☆31Updated 3 weeks ago
- Portable C implementations of the AEGIS family of high-performance authenticated encryption algorithms.☆103Updated last month