soatok / constant-time-jsLinks
Constant-time JavaScript functions
☆58Updated 3 years ago
Alternatives and similar repositories for constant-time-js
Users that are interested in constant-time-js are comparing it to the libraries listed below
Sorting:
- c implementation of the OPAQUE protocol with bindings for python, php, ruby, lua, zig, java, erlang, golang, js and SASL. also supports a…☆83Updated 4 months ago
- Signcryption using libsodium.☆66Updated last year
- Oblivious Pseudorandom Functions (OPRFs) using Prime-Order Groups☆38Updated last year
- ☆82Updated 5 years ago
- A TypeScript library for OPAQUE Asymmetric Password-Authenticated Key Exchange Protocol☆89Updated last year
- OPAQUE protocol, a secure asymmetric password authenticated key exchange (aPAKE) that supports mutual authentication in a client-server s…☆81Updated 4 years ago
- Constant-time WebAssembly☆20Updated 3 years ago
- Community Cryptography Test Vectors☆84Updated 6 months ago
- TypeScript Implementation of X3DH☆97Updated 2 years ago
- library providing OPRF and Threshold OPRF based on libsodium☆28Updated last week
- The OPAQUE Asymmetric PAKE Protocol☆110Updated 8 months ago
- An animated visualization of elliptic curve cryptography☆147Updated 3 months ago
- Sphinx-based Password Storage low-level library☆129Updated 8 months ago
- Coordination of implementation and interop specific details☆123Updated 6 months ago
- ☆12Updated last year
- MLS architecture☆74Updated 6 months ago
- Experimental committing AEAD designed by Soatok.☆10Updated 5 years ago
- ☆64Updated last year
- Intuitive Quantum Computation and Post-Quantum Cryptography☆63Updated 3 years ago
- The anonymous credentials zoo☆16Updated 4 years ago
- An Internet-Draft for the Balloon Key Derivation Function (BKDF), a memory-hard password hashing and password-based key derivation functi…☆11Updated 4 months ago
- A dead man's switch for full but responsible disclosure of vulnerabilities☆57Updated last year
- Go implementation of XMSS[MT] post-quantum hash-based signature scheme (rfc8391)☆23Updated 3 years ago
- Implementation and simulations for the "Reducing Metadata Leakage from Encrypted Data and Communication with PURBs" paper☆30Updated 2 years ago
- JavaScript XAES-256-GCM implementation using Web Cryptography API☆13Updated last year
- Crypto Audit Guidelines☆134Updated 4 years ago
- A tweakable block cipher☆31Updated last year
- Bertie TLS 1.3 Implementation☆125Updated 2 weeks ago
- Is SIKE broken yet?☆19Updated 2 years ago
- Optimized Binary GCD for Modular Inversion☆45Updated 5 years ago