ed25519
cipher-aes
Our great sponsors
- Onboard AI - Learn any GitHub repo in 59 seconds
- InfluxDB - Collect and Analyze Billions of Data Points in Real Time
- SaaSHub - Software Alternatives and Reviews
ed25519 | cipher-aes | |
---|---|---|
14 | 0 | |
20 | 22 | |
- | - | |
0.0 | 0.0 | |
14 days ago | over 2 years ago | |
C | C | |
MIT License | BSD 3-clause "New" or "Revised" License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
ed25519
- Обзор Aptos SDK
-
Is your SSH key still safe?
> For the ED25519, the key size should be 256 or larger.
This tripped my bullshit filter. ED25519 is 256 bits always: https://ed25519.cr.yp.to/
-
The Joy of Cryptography
Those numbers are clearly nonsense; notice how the smaller ones don't even scale with key size. That paper is flawed. They obviously made a mistake.
Look at the ed25519 benchmarks:
71000 signature verifications per second and 109000 signature generations per second on a quad-core machine. That is much, much faster than RSA.
cipher-aes
We haven't tracked posts mentioning cipher-aes yet.
Tracking mentions began in Dec 2020.
What are some alternatives?
secp256k1 - Haskell bindings for secp256k1 library
cryptohash-sha256 - Fast, pure and practical SHA-256 implementation
servant-hmac-auth - Servant authentication with HMAC
lol - Λ ⚬ λ: Functional Lattice Cryptography
merkle-tree
blake3 - official implementations of the BLAKE3 cryptographic hash function
bcrypt - Haskell bindings for bcrypt
HsOpenSSL - OpenSSL binding for Haskell
pedersen-commitment
aos-signature - Abe-Ohkubo-Suzuki Linkable Ring Signatures
scrypt - Haskell bindings to Colin Percival's scrypt implementation.
oblivious-transfer - Oblivious transfer for multiparty computation