thomwiggers / kemtls-experimentView external linksLinks
Experimental implementation of KEMTLS in Rustls
☆34Nov 11, 2025Updated 3 months ago
Alternatives and similar repositories for kemtls-experiment
Users that are interested in kemtls-experiment are comparing it to the libraries listed below
Sorting:
- Tamarin proof for the KEMTLS protocol using the multi-stage AKE model☆13Apr 19, 2023Updated 2 years ago
- ☆34Oct 7, 2025Updated 4 months ago
- Official SQISignHD code, version under continuous development.☆12Jul 18, 2025Updated 6 months ago
- Code and data for benchmarking post-quantum cryptography in TLS 1.3☆22Feb 10, 2021Updated 5 years ago
- Proof-of-concept implementation of the (V)OPRF protocol in https://datatracker.ietf.org/doc/draft-irtf-cfrg-voprf/☆23Aug 24, 2020Updated 5 years ago
- Docker image: DNS over HTTPS proxy☆11Jun 26, 2020Updated 5 years ago
- I-D that describes the algorithm identifiers for NIST's PQC ML-DSA for use in the Internet X.509 Public Key Infrastructure☆14Oct 30, 2025Updated 3 months ago
- ☆14Apr 14, 2025Updated 9 months ago
- Circuits for functions of interest to cryptography☆28Jan 31, 2024Updated 2 years ago
- Solution to harden TLS security by storing private keys and delegating operations to the Trused Execution Environment☆13Oct 10, 2022Updated 3 years ago
- An Internet-Draft for the Balloon Key Derivation Function (BKDF), a memory-hard password hashing and password-based key derivation functi…☆11Jun 29, 2025Updated 7 months ago
- Implementation and simulations for the "Reducing Metadata Leakage from Encrypted Data and Communication with PURBs" paper☆31Oct 26, 2023Updated 2 years ago
- Rust bindings for HACL & Evercrypt☆30Apr 24, 2025Updated 9 months ago
- High Speed elliptic curve signature system using a 260-bit Granger Moss Prime.☆14Jun 3, 2021Updated 4 years ago
- Guidelines, procedures, and templates used by the IETF Moderators team.☆23Jan 29, 2026Updated 2 weeks ago
- Clean, portable, tested implementations of post-quantum cryptography☆864Jan 9, 2026Updated last month
- Exploration of NIST post-quantum signatures on-ramp candidates☆38Jun 1, 2025Updated 8 months ago
- App for controlling the DNSCrypt Proxy on Android☆12Dec 28, 2017Updated 8 years ago
- GPU code for the first SHA-1 collision attack and two freestart attacks☆14Jun 22, 2020Updated 5 years ago
- ☆34Jul 9, 2020Updated 5 years ago
- [DEPRECATED — See notice in README.md and switch to OpenSSL 3 OQS Provider] Fork of OpenSSL 1.1.1 that includes prototype quantum-resista…☆309Jan 5, 2026Updated last month
- Mirror of my Go Kyber implementation.☆16May 30, 2018Updated 7 years ago
- Elliptic curves Rust reference implementation☆16Mar 10, 2024Updated last year
- Intuitive Quantum Computation and Post-Quantum Cryptography☆63Sep 21, 2022Updated 3 years ago
- An implementation of Mike Hamburg's Ed448 (Goldilocks) curve - derived from libdecaf. This is a mirror of https://bugs.otr.im/otrv4/libgo…☆19Mar 16, 2020Updated 5 years ago
- TLS in Rust (eventually)☆21Mar 12, 2013Updated 12 years ago
- Implementation of libsodium's secretstream in Go☆20Jan 13, 2026Updated last month
- ☆17Feb 21, 2022Updated 3 years ago
- Updated! (Dec2-2019) This is a C-language software library that provides optimized implementations of the Diffie-Hellman functions known …☆44Nov 10, 2023Updated 2 years ago
- Rust Post-Quantum cryptography☆381Dec 2, 2025Updated 2 months ago
- Stronger and Faster Side-Channel Protections for CSIDH☆20Dec 20, 2020Updated 5 years ago
- Faster Montgomery and Joye ladder formulas for short Weierstrass elliptic curves☆22Jul 1, 2020Updated 5 years ago
- dnscrypt - authenticated and encrypted dns client for nodejs☆14Sep 26, 2020Updated 5 years ago
- ☆21Dec 16, 2022Updated 3 years ago
- cgo wrappers around post-quantum cryptography primitives☆23Dec 3, 2018Updated 7 years ago
- ☆19Nov 22, 2025Updated 2 months ago
- Software optimized implementations of GIFT and GIFT-COFB☆18Mar 29, 2022Updated 3 years ago
- Script generated finite field arithmetic for elliptic curve cryptography☆24Updated this week
- Package fourq implements FourQ, a high-speed elliptic curve at the 128-bit security level.☆54Oct 14, 2024Updated last year