Wycheproof for Rust
☆20Sep 3, 2025Updated 6 months ago
Alternatives and similar repositories for wycheproof-rs
Users that are interested in wycheproof-rs are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- High Speed elliptic curve signature system using a 260-bit Granger Moss Prime.☆14Jun 3, 2021Updated 4 years ago
- Solution to harden TLS security by storing private keys and delegating operations to the Trused Execution Environment☆13Oct 10, 2022Updated 3 years ago
- A privacy-preserving digital version of punch cards used in store loyalty programs☆11Apr 19, 2021Updated 4 years ago
- Fast and simple constant-time hashing to the BLS12-381 elliptic curve☆44Mar 13, 2020Updated 6 years ago
- Pure Rust implementation of HPKE (https://www.rfc-editor.org/rfc/rfc9180.html)☆48Mar 19, 2026Updated last week
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆15May 27, 2021Updated 4 years ago
- A tool for linear and differential cryptanalysis of block ciphers written in Rust☆15Sep 28, 2022Updated 3 years ago
- I-D that describes the algorithm identifiers for NIST's PQC ML-DSA for use in the Internet X.509 Public Key Infrastructure☆14Oct 30, 2025Updated 4 months ago
- ☆42Oct 19, 2021Updated 4 years ago
- Vector Commitments with Constant-Sized, Updatable Proofs and Linear-Sized Public Parameters☆11Jun 3, 2021Updated 4 years ago
- ☆10Jan 7, 2024Updated 2 years ago
- Traits and utilities for working with finite fields☆18Aug 15, 2024Updated last year
- [RFC9380] Hash to curves - Rust reference implementation☆27Mar 10, 2024Updated 2 years ago
- Misuse cases of Cryptography in real world software products☆12Nov 4, 2018Updated 7 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- ☆33Feb 14, 2025Updated last year
- Anemoi: a Family of ZK-friendly Arithmetization Oriented Hash Functions☆14Jul 9, 2023Updated 2 years ago
- Pointcheval Sanders signature☆27Mar 16, 2026Updated last week
- Identity Based Encryption schemes on the BLS12-381 pairing-friendly elliptic curve☆20Aug 31, 2021Updated 4 years ago
- Fast 4 way vectorized ladder for the complete set of Montgomery curves☆11Feb 13, 2019Updated 7 years ago
- a web page / paper☆18Feb 24, 2017Updated 9 years ago
- Prover for the Plumo light client system https://docs.zkproof.org/pages/standards/accepted-workshop3/proposal-plumo_celolightclient.pdf☆14Jan 4, 2022Updated 4 years ago
- [HISTORICAL] FIPS and higher-level algorithm tests for RISC-V Crypto Extension☆29Jul 23, 2024Updated last year
- Slides from talks and other materials related to post-quantum crypto☆12Feb 20, 2021Updated 5 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Implementation of the blindbid logic within Zero Knowledge Proofs☆20Sep 15, 2021Updated 4 years ago
- Mirror of my Go Kyber implementation.☆16May 30, 2018Updated 7 years ago
- ABE GPSW scheme using BLS pairing implemented in Rust.☆16May 23, 2023Updated 2 years ago
- Proof-of-concept implementation of the (V)OPRF protocol in https://datatracker.ietf.org/doc/draft-irtf-cfrg-voprf/☆22Aug 24, 2020Updated 5 years ago
- Rust implementation of Zcash multi-signautres☆13Jun 23, 2019Updated 6 years ago
- Results of a recent FOIA for NIST documents related to the design of Dual EC DRBG. Via EFF and Rep. Grayson's office. See README for deta…☆24Feb 10, 2015Updated 11 years ago
- A pure rust implementation of the gimli cipher☆13Jan 26, 2022Updated 4 years ago
- Reference implementations of post-quantum cryptographic primitives☆33Feb 16, 2026Updated last month
- Tamarin proof for the KEMTLS protocol using the multi-stage AKE model☆13Apr 19, 2023Updated 2 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Draft documents for standardization of Plonkish arithmetization☆23Mar 15, 2024Updated 2 years ago
- Bottom-up memory-safety for assembly language using symbolic execution☆17Feb 19, 2026Updated last month
- LegoGroth16 implementation on top of Zexe☆25Dec 3, 2021Updated 4 years ago
- Multi-party computation for Zcash's "Sapling" zk-SNARK public parameters☆30Jan 22, 2023Updated 3 years ago
- Efficient implementation of maksed AES on ARM NEON☆23Jun 6, 2017Updated 8 years ago
- A rusty implementation of the Caulk+ lookup algorithm.☆12Dec 18, 2022Updated 3 years ago
- Go implementation of bcrypt_pbkdf(3) from OpenBSD