pyca / ed25519
Optimized version of the reference implementation of Ed25519
☆35Updated last year
Alternatives and similar repositories for ed25519:
Users that are interested in ed25519 are comparing it to the libraries listed below
- Pong revolution.☆13Updated 5 years ago
- TLS WG Wiki☆13Updated 3 months ago
- Xoodyak, a lightweight and versatile cryptographic scheme implemented in Rust.☆29Updated last year
- Mirror of http://sourceforge.net/p/ed448goldilocks/code/ci/master/tree/☆33Updated 9 years ago
- Argon2 key derivation function in zig.☆15Updated 3 years ago
- Deterministic/nonce-reuse resistant authenticated encryption scheme using XChaCha20, implemented on libsodium.☆29Updated 8 months ago
- ☆19Updated 4 years ago
- ☆19Updated 2 years ago
- Towards an IETF RFC for XChaCha20-Poly1305☆28Updated 5 years ago
- A fast secure userspace pseudorandom number generator☆82Updated 10 years ago
- Naehrig, Niederhagen and Schwabe's pairings code, massaged into a shared library.☆16Updated 8 years ago
- A memory-hard password hashing function.☆69Updated last year
- cut out a small (binary) piece of a (binary) file☆15Updated 13 years ago
- HPKE implementation for Zig.☆17Updated last month
- TLS Shell☆27Updated 5 years ago
- Reference Implementation of Catena, a memory-consuming password scrambler☆31Updated 7 years ago
- secure messaging, file-transfer, and directory synchronization☆41Updated 7 years ago
- Scripts that I used to write a blog post about section 7.24.1(2) of C11☆11Updated 8 years ago
- Abusing U2F to 'store' a stable secret☆16Updated 9 years ago
- Blind RSA signatures for OpenSSL/BoringSSL.☆17Updated 11 months ago
- Cryptographic signing, ported from BSD for Linux, that uses instructions of modern CPUs☆24Updated 4 years ago
- Various crypto utilities for dealing with MACs, Signatures, and PGP message formats.☆30Updated 6 years ago
- BAT KEM/Signature Reference Implementation☆21Updated 3 years ago
- Make AES-GCM safe to use with random nonces, for any practical number of messages.☆18Updated last year
- Oblivious Pseudorandom Functions (OPRFs) using Prime-Order Groups☆39Updated 7 months ago
- ipcrypt implementation in C☆31Updated 2 weeks ago
- Experimental High Assurance Cryptographic Library☆20Updated 9 years ago
- Label-based networking daemon☆22Updated 6 years ago
- A high-security scalable solution for online backups.☆45Updated 10 years ago
- An RFC5297-compliant C implementation of AES-SIV☆19Updated 4 years ago