soatok / constant-time-jsLinks
Constant-time JavaScript functions
☆60Updated 3 years ago
Alternatives and similar repositories for constant-time-js
Users that are interested in constant-time-js are comparing it to the libraries listed below
Sorting:
- c implementation of the OPAQUE protocol with bindings for python, php, ruby, lua, zig, java, erlang, golang, js and SASL. also supports a…☆86Updated 7 months ago
- Signcryption using libsodium.☆68Updated last month
- ☆82Updated 5 years ago
- Oblivious Pseudorandom Functions (OPRFs) using Prime-Order Groups☆38Updated last year
- A TypeScript library for OPAQUE Asymmetric Password-Authenticated Key Exchange Protocol☆101Updated 2 months ago
- TypeScript Implementation of X3DH☆101Updated 2 years ago
- Experimental committing AEAD designed by Soatok.☆10Updated 5 years ago
- Community Cryptography Test Vectors☆97Updated last month
- OPAQUE protocol, a secure asymmetric password authenticated key exchange (aPAKE) that supports mutual authentication in a client-server s…☆87Updated last month
- library providing OPRF and Threshold OPRF based on libsodium☆30Updated 3 weeks ago
- The OPAQUE Asymmetric PAKE Protocol☆112Updated last year
- A collection of common (interesting) cryptographic mistakes and learning resources.☆366Updated 7 months ago
- Coordination of implementation and interop specific details☆127Updated 2 weeks ago
- Sphinx-based Password Storage low-level library☆129Updated last year
- JavaScript XAES-256-GCM implementation using Web Cryptography API☆13Updated last year
- Implementation and simulations for the "Reducing Metadata Leakage from Encrypted Data and Communication with PURBs" paper☆31Updated 2 years ago
- ☆65Updated last year
- Javascript implementation of the Ristretto255 group operations, built on top of the popular TweetNaCl.js crypto library☆33Updated 2 years ago
- Constant-time WebAssembly☆20Updated 3 years ago
- Constant time big numbers for Go☆106Updated 11 months ago
- MLS architecture☆75Updated 10 months ago
- A WASM package and web app for encrypting and decrypting age-encrypted files, powered by rage.☆88Updated 3 years ago
- Crypto Audit Guidelines☆134Updated 5 years ago
- Intuitive Quantum Computation and Post-Quantum Cryptography☆63Updated 3 years ago
- ☆13Updated 2 years ago
- An animated visualization of elliptic curve cryptography☆155Updated 6 months ago
- An Internet-Draft for the Balloon Key Derivation Function (BKDF), a memory-hard password hashing and password-based key derivation functi…☆11Updated 7 months ago
- Implementations of do255e and do255s in C and assembly☆25Updated 4 years ago
- Xoodyak, a lightweight and versatile cryptographic scheme implemented in Rust.☆30Updated 9 months ago
- BAT KEM/Signature Reference Implementation☆23Updated 4 years ago