A tool for linear and differential cryptanalysis of block ciphers written in Rust
☆15Sep 28, 2022Updated 3 years ago
Alternatives and similar repositories for cryptagraph
Users that are interested in cryptagraph are comparing it to the libraries listed below
Sorting:
- Pointcheval Sanders signature☆27Jan 16, 2020Updated 6 years ago
- Vector Commitments with Constant-Sized, Updatable Proofs and Linear-Sized Public Parameters☆11Jun 3, 2021Updated 4 years ago
- [wip] implementing origami VDF☆13Mar 1, 2023Updated 2 years ago
- An Internet-Draft for the Balloon Key Derivation Function (BKDF), a memory-hard password hashing and password-based key derivation functi…☆11Jun 29, 2025Updated 8 months ago
- High Speed elliptic curve signature system using a 260-bit Granger Moss Prime.☆14Jun 3, 2021Updated 4 years ago
- Banquet implementation☆14May 6, 2022Updated 3 years ago
- ABE GPSW scheme using BLS pairing implemented in Rust.☆16May 23, 2023Updated 2 years ago
- [RFC9380] Hash to curves - Rust reference implementation☆28Mar 10, 2024Updated last year
- Optimized Binary GCD for Modular Inversion☆52Oct 28, 2020Updated 5 years ago
- Reference implementation of the BLZZRD variant of the BLISS Ring-LWE Signature Scheme☆17Oct 11, 2016Updated 9 years ago
- Wycheproof for Rust☆20Sep 3, 2025Updated 5 months ago
- Faster Montgomery and Joye ladder formulas for short Weierstrass elliptic curves☆22Jul 1, 2020Updated 5 years ago
- An implementation of ZKBoo☆33May 10, 2022Updated 3 years ago
- like ChaCha, but 64-bit instead of 32-bit thanks to BLAKE2b's permutation☆16Apr 8, 2017Updated 8 years ago
- Reference implementations of post-quantum cryptographic primitives☆33Feb 16, 2026Updated last week
- An implementation of the append-only log described in the Certificate Transparency specification (RFC 6962)☆38Apr 11, 2025Updated 10 months ago
- CryptOpt: Verified Compilation with Randomized Program Search for Cryptographic Primitives☆66Jun 26, 2024Updated last year
- Differential fuzzing for elliptic curves☆24Sep 6, 2023Updated 2 years ago
- A privacy-preserving digital version of punch cards used in store loyalty programs☆11Apr 19, 2021Updated 4 years ago
- Implementations of do255e and do255s in C and assembly☆25May 3, 2021Updated 4 years ago
- (Oblivious) DoH Server☆26Feb 21, 2022Updated 4 years ago
- Proof-of-concept implementation of the (V)OPRF protocol in https://datatracker.ietf.org/doc/draft-irtf-cfrg-voprf/☆23Aug 24, 2020Updated 5 years ago
- Zcash-flavored Ed25519 for use in Zebra.☆35Feb 20, 2026Updated last week
- Models for authenticated key exchange in Tamarin☆12Oct 9, 2019Updated 6 years ago
- Misuse cases of Cryptography in real world software products☆12Nov 4, 2018Updated 7 years ago
- Provisions: Privacy-preserving proofs of solvency for Bitcoin☆14Jan 10, 2016Updated 10 years ago
- Optimized implementation of ring-TESLA☆11Aug 4, 2016Updated 9 years ago
- Docker image: DNS over HTTPS proxy☆11Jun 26, 2020Updated 5 years ago
- Implementation of the Fish and Begol signature schemes☆14Jul 3, 2017Updated 8 years ago
- Circuits for functions of interest to cryptography☆28Jan 31, 2024Updated 2 years ago
- ☆27Oct 18, 2022Updated 3 years ago
- A tool for compiling and linking Zig libraries to Rust projects.☆14Feb 2, 2023Updated 3 years ago
- ☆11Feb 6, 2024Updated 2 years ago
- ☆15Jul 8, 2021Updated 4 years ago
- Military-Grade Password Manager☆12Dec 6, 2016Updated 9 years ago
- Solution to harden TLS security by storing private keys and delegating operations to the Trused Execution Environment☆13Oct 10, 2022Updated 3 years ago
- Parses https://eprint.iacr.org/eprint-bin/search.pl?last=365&title=1 and sends you an email with the latest papers☆15Nov 11, 2020Updated 5 years ago
- Go implementation of bcrypt_pbkdf(3) from OpenBSD☆15Feb 5, 2015Updated 11 years ago
- ☆12May 7, 2021Updated 4 years ago