pyca / ed25519
Optimized version of the reference implementation of Ed25519
☆36Updated last year
Alternatives and similar repositories for ed25519:
Users that are interested in ed25519 are comparing it to the libraries listed below
- Blind RSA signatures for OpenSSL/BoringSSL.☆17Updated 9 months ago
- Xoodyak, a lightweight and versatile cryptographic scheme implemented in Rust.☆29Updated 11 months ago
- ☆19Updated 4 years ago
- mozilla: Firefox's X.509 certificate verification core code.☆22Updated 9 years ago
- A memory-hard password hashing function.☆68Updated last year
- Naehrig, Niederhagen and Schwabe's pairings code, massaged into a shared library.☆16Updated 8 years ago
- Deterministic/nonce-reuse resistant authenticated encryption scheme using XChaCha20, implemented on libsodium.☆28Updated 6 months ago
- Mirror of http://sourceforge.net/p/ed448goldilocks/code/ci/master/tree/☆33Updated 9 years ago
- pure-python routines for curve25519/ed25519☆35Updated 5 years ago
- BAT KEM/Signature Reference Implementation☆20Updated 3 years ago
- TLS WG Wiki☆13Updated last month
- ☆19Updated 2 years ago
- katzenpost mix network encrypted messaging client library☆43Updated 2 years ago
- library for implementing the server side of the mix network: mixes and providers☆26Updated 2 years ago
- OFTC's IRC Services☆34Updated 3 months ago
- Apache milagro (Incubating)☆36Updated 11 months ago
- A compiler for secure multiparty computation☆50Updated 8 years ago
- Verifying constant-time code with symbolic execution☆42Updated 3 years ago
- Rust implementation of CryptoURI: URN-like namespace for cryptographic objects with Bech32-based encoding☆36Updated last year
- Haraka is a secure and efficient short-input hash function.☆55Updated 7 years ago
- (Oblivious) DoH Server☆27Updated 3 years ago
- Elliptic curves Rust reference implementation☆15Updated 11 months ago
- Certificate transparency SCT verification library in rust☆51Updated 3 months ago
- CONIKS design documents☆16Updated 8 years ago
- An library for processing keybase's signature tree.☆9Updated last year
- ☆18Updated last year
- VDAF specification☆22Updated this week
- Signature scheme submitted to NIST's Post-Quantum Cryptography Project☆28Updated 7 years ago
- Oblivious Pseudorandom Functions (OPRFs) using Prime-Order Groups☆39Updated 5 months ago
- Pong revolution.☆13Updated 5 years ago