utils
RCIG_Coordination_Repo
utils | RCIG_Coordination_Repo | |
---|---|---|
8 | 18 | |
404 | 240 | |
2.5% | 2.9% | |
8.9 | 3.5 | |
11 days ago | 23 days ago | |
Rust | HTML | |
- | - |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
utils
-
Announcing `compact_str` version 0.7! A small string optimization for Rust
I didn't use any inline asm, instead I wrote the simplest if statement possible, which I confirmed on x86_64, x86, and aarch64 compiles down to use the platform's supported conditional move instructions. If this changes in the future and there's a need to write inline asm, you can do so in a portable way, e.g. the cmov crate.
-
Shoot me straight.
There's also cpufeatures which might suit your use case better (depending on exactly how you want to do it).
-
Crate for AES256 - which one to choose? Questions about block cipher modes and AEAD too.
I have seen that RustCrypto also offers a create for securely zeroing memory with: zeroize
-
`kindly`: a simplistic (and hopefully educational) implementation of a set-user-ID-root program (think mini `sudo`) for Linux
The zeroing routine itself looks fine to me. You might want to compare your code with the (already mentioned) zeroize crate, which does something similar (or maybe identical?).
-
Maybe found a Y2k bug in the rust-crypto DER-encoding util?
To save a few clicks, this was found to be, indeed, a Y2K issue, and der v0.4.1 has just been released to fix it. Citing the comment added to the issue after the fact:
-
Incredibly fast UTF-8 validation
I opened a tracking issue for that.
-
Now that the long-awaited const generics (MVP) have come to stable in 1.51, what crates are going to gain the most from it?
https://github.com/RustCrypto/utils/pull/325#issuecomment-791503136
RCIG_Coordination_Repo
-
Do any libraries exist for zero-trust file storage (storing client-encrypted data on the server without the key)?
You may find https://cryptography.rs/ helpful -- especially https://cryptography.rs/#high-level-libraries.
-
Major standard library changes in Go 1.20
https://cryptography.rs/
I would still like to have a more comprehensive or high level stdlib for Rust that is maintained by a core Rust team.
-
[Noob alert] Is there a way to encrypt and decrypt a file with a password using rust?
Checkout https://cryptography.rs/ and look under the symmetric encryption section.
-
Hey Rustaceans! Got a question? Ask here! (30/2022)!
There are some listed on https://cryptography.rs/
-
dryoc – a pure-Rust libsodium implementation
Relevant Rust Crypto Interest Group issue on what compiler changes would be helpful for constant-time assuredness.
- Looking for good (low level?) Elliptic Curve library
-
Rust cryptography resources.
If you’re looking for good crypto libraries try http://cryptography.rs
-
Math programming for newbies like me
If you want to see some existing crypto in rust I suggest taking a look at http://cryptography.rs
- Crate for AES256 - which one to choose? Questions about block cipher modes and AEAD too.
- Rust Cryptography: Showcase of notable cryptography libraries in Rust
What are some alternatives?
reference - The Rust Reference
block-ciphers - Collection of block cipher algorithms written in pure Rust
sudo_pair - Plugin for sudo that requires another human to approve and monitor privileged sudo sessions
concrete - Concrete: TFHE Compiler that converts python programs into FHE equivalent
rust-crypto - A (mostly) pure-Rust implementation of various cryptographic algorithms.
heapless - Heapless, `static` friendly data structures
librabft_simulator - Discrete-event simulation for BFT consensus protocols
gdb-multiarch-windows - GDB multi-architecture build for Windows
tinyvec - Just, really the littlest Vec you could need. So smol.
hacl-star - HACL*, a formally verified cryptographic library written in F*