stef / libsphinx
Sphinx-based Password Storage low-level library
☆129Updated 3 weeks ago
Alternatives and similar repositories for libsphinx:
Users that are interested in libsphinx are comparing it to the libraries listed below
- ☆81Updated 4 years ago
- A SPAKE2+ Elligator Edition implementation for libsodium 1.0.16+☆41Updated 4 years ago
- A memory-hard password hashing function.☆68Updated last year
- A tiny C cryptographic library to encrypt sessions, authenticate messages, sign, hash, etc. based only on SHA-3 and Curve25519☆66Updated 3 years ago
- ☆39Updated 3 years ago
- Supersingular Isogeny Diffie-Hellman in Go☆135Updated 5 years ago
- Wiki for Noise development☆82Updated 8 years ago
- ☆97Updated 8 years ago
- python bindings for libsphinx, a reference client/server and a native backend for web-extensions for Sphinx-based password storage☆18Updated this week
- The OPAQUE Asymmetric PAKE Protocol☆102Updated 3 weeks ago
- Signcryption using libsodium.☆62Updated last year
- Reference implementations (software)☆85Updated 8 years ago
- ☆57Updated 7 years ago
- A python library that implements a number of Privacy Enhancing Technolgies☆132Updated 2 years ago
- C implementation of Elligator 2 for Curve25519☆31Updated 3 years ago
- ☆32Updated 3 years ago
- c implementation of the OPAQUE protocol with bindings for python, php, ruby, lua, zig, java, erlang, golang, js and SASL. also supports a…☆73Updated this week
- A CPace PAKE implementation using libsodium.☆35Updated 4 years ago
- HILA5 KEM/DEM. Reference and Optimized Implementations + NIST PQC Submission Documents☆16Updated 6 years ago
- OPAQUE protocol, a secure asymmetric password authenticated key exchange (aPAKE) that supports mutual authentication in a client-server s…☆77Updated 3 years ago
- Experimental implementation of KEMTLS in Rustls☆29Updated last year
- Coordination of implementation and interop specific details☆113Updated 8 months ago
- Deterministic/nonce-reuse resistant authenticated encryption scheme using XChaCha20, implemented on libsodium.☆28Updated 6 months ago
- ☆11Updated last year
- ☆61Updated 4 months ago
- DEPRECATED: A C++ Elligator2 implementation☆15Updated 4 years ago
- Small, self-contained C implementation of Ristretto255 based on libdecaf☆13Updated 5 years ago
- Haraka is a secure and efficient short-input hash function.☆55Updated 7 years ago
- Updated! (Dec2-2019) This is a C-language software library that provides optimized implementations of the Diffie-Hellman functions known …☆44Updated last year
- Go implementation of XMSS[MT] post-quantum hash-based signature scheme (rfc8391)☆24Updated 2 years ago