lentus / wotsp
An implementation of the Winternitz OTS (W-OTS+) in Go
☆13Updated 5 years ago
Alternatives and similar repositories for wotsp:
Users that are interested in wotsp are comparing it to the libraries listed below
- specification and design documents☆54Updated 2 years ago
- OPAQUE asymmetric PAKE, and its threshold implementation. Experimental, not audited.☆17Updated 3 years ago
- ♥ ♥ ♥ Trevor's & Moxie's Axolotl Ratchet + AGL's xmpp-client ♥ ♥ ♥☆12Updated 10 years ago
- a Private Publish Subscribe System☆49Updated 10 months ago
- ☆18Updated last year
- repository for tracking open tasks☆18Updated 7 years ago
- Deterministic And Verifiable Randomness On Schnorr signatures☆13Updated 7 years ago
- library for implementing the server side of the mix network: mixes and providers☆26Updated 2 years ago
- Pure Java implementation of group operations on ristretto255 and Curve25519☆27Updated last year
- Go implementation of XMSS[MT] post-quantum hash-based signature scheme (rfc8391)☆24Updated 2 years ago
- Challenge Bypass using the Ristretto group☆35Updated last week
- Small, self-contained C implementation of Ristretto255 based on libdecaf☆13Updated 5 years ago
- Public working documents (e.g., Internet drafts)☆23Updated 6 years ago
- Go package blake512 implements BLAKE-512 and BLAKE-384 hash functions (SHA-3 finalist).☆11Updated 6 years ago
- A core and experimental implementation of ClaimChain☆34Updated 6 years ago
- SPHINCS-256 practical stateless hash-based signature scheme☆26Updated 8 years ago
- Infinitely presentable (aeon) rerandomisable (flux) anonymous credentials.☆28Updated 4 years ago
- A general-purpose privacy-preserving Analytics platform!☆11Updated 6 years ago
- Deterministic/nonce-reuse resistant authenticated encryption scheme using XChaCha20, implemented on libsodium.☆29Updated 7 months ago
- Working Copy of the NSEC5 Specification☆15Updated 4 years ago
- Pixel: Forward secure multi-signatures and threshold signatures☆17Updated 2 years ago
- katzenpost mix network encrypted messaging client library☆43Updated 2 years ago
- APRICOT: Advanced Protocols for Real-world Implementation of Computational Oblivious Transfers☆16Updated 8 years ago
- a CCA-secure module-lattice-based KEM☆16Updated 6 years ago
- BLS working standard draft☆39Updated 5 years ago
- 🦀 Rust implementation of sinkhole private information retrieval☆15Updated 3 years ago
- An independent implementation of the Powers of Tau MPC ceremony.☆33Updated 7 years ago
- A pure-Rust implementation of group operations on Ristretto and Curve25519☆28Updated 7 months ago
- ☆81Updated 4 years ago
- Auditing Applied Cryptography☆10Updated 5 years ago