library providing OPRF and Threshold OPRF based on libsodium
☆31Updated this week
Alternatives and similar repositories for liboprf
Users that are interested in liboprf are comparing it to the libraries listed below
Sorting:
- c implementation of the OPAQUE protocol with bindings for python, php, ruby, lua, zig, java, erlang, golang, js and SASL. also supports a…☆86Jun 24, 2025Updated 8 months ago
- High Speed elliptic curve signature system using a 260-bit Granger Moss Prime.☆14Jun 3, 2021Updated 4 years ago
- Banquet implementation☆14May 6, 2022Updated 3 years ago
- OPAQUE asymmetric PAKE, and its threshold implementation. Experimental, not audited.☆17Jun 16, 2021Updated 4 years ago
- data-at-rest updatable threshold encryption KMS server and client☆22Jan 23, 2026Updated last month
- Proof-of-concept implementation of the (V)OPRF protocol in https://datatracker.ietf.org/doc/draft-irtf-cfrg-voprf/☆23Aug 24, 2020Updated 5 years ago
- Pointcheval Sanders signature☆27Jan 16, 2020Updated 6 years ago
- Implementation of https://www.ietf.org/archive/id/draft-denis-aegis-aead-00.html / https://competitions.cr.yp.to/round3/aegisv11.pdf☆15Mar 25, 2025Updated 11 months ago
- The OPAQUE Asymmetric PAKE Protocol☆112Jan 30, 2025Updated last year
- Identity Based Encryption schemes on the BLS12-381 pairing-friendly elliptic curve☆20Aug 31, 2021Updated 4 years ago
- A tool for linear and differential cryptanalysis of block ciphers written in Rust☆15Sep 28, 2022Updated 3 years ago
- Circuits for functions of interest to cryptography☆28Jan 31, 2024Updated 2 years ago
- ABE GPSW scheme using BLS pairing implemented in Rust.☆16May 23, 2023Updated 2 years ago
- Wycheproof for Rust☆20Sep 3, 2025Updated 5 months ago
- Proof of Device☆20Jan 20, 2023Updated 3 years ago
- Xoodyak, a lightweight and versatile cryptographic scheme implemented in Rust.☆30Apr 24, 2025Updated 10 months ago
- This is only the beginning.☆19Feb 9, 2026Updated 2 weeks ago
- Faster Montgomery and Joye ladder formulas for short Weierstrass elliptic curves☆22Jul 1, 2020Updated 5 years ago
- VDAF specification☆25Feb 15, 2026Updated last week
- Internet-Draft on IP address privacy☆17Mar 30, 2025Updated 11 months ago
- BAT KEM/Signature Reference Implementation☆23Dec 28, 2021Updated 4 years ago
- Reference implementations of post-quantum cryptographic primitives☆33Feb 16, 2026Updated last week
- like ChaCha, but 64-bit instead of 32-bit thanks to BLAKE2b's permutation☆16Apr 8, 2017Updated 8 years ago
- ☆38Dec 16, 2021Updated 4 years ago
- Updated! (Dec2-2019) This is a C-language software library that provides optimized implementations of the Diffie-Hellman functions known …☆44Nov 10, 2023Updated 2 years ago
- Pure Go implementation of the Ristretto prime-order group over Edwards25519☆90Mar 16, 2023Updated 2 years ago
- Implementation of do255e and do255s in Go☆23Dec 14, 2020Updated 5 years ago
- The Secure Block Device Library is a software library that applies cryptographic confidentiality and integrity protection, including data…☆36Jan 16, 2018Updated 8 years ago
- EyeDP is an Identity Provider☆10Feb 29, 2024Updated 2 years ago
- A privacy-preserving digital version of punch cards used in store loyalty programs☆11Apr 19, 2021Updated 4 years ago
- An implementation of a verifiable oblivious pseudorandom function (RFC 9497)☆77Feb 13, 2026Updated 2 weeks ago
- Implementation of the Fish and Begol signature schemes☆14Jul 3, 2017Updated 8 years ago
- Post-quantum trusted time-stamping server☆17Dec 11, 2024Updated last year
- Verify your NIPoPoWs efficiently, here☆11Dec 8, 2022Updated 3 years ago
- I-D that describes the algorithm identifiers for NIST's PQC ML-DSA for use in the Internet X.509 Public Key Infrastructure☆14Oct 30, 2025Updated 4 months ago
- ☆10Jan 29, 2025Updated last year
- Misuse cases of Cryptography in real world software products☆12Nov 4, 2018Updated 7 years ago
- Models for authenticated key exchange in Tamarin☆12Oct 9, 2019Updated 6 years ago
- Optimized implementation of ring-TESLA☆11Aug 4, 2016Updated 9 years ago