covert-encryption
covert-encryption
Use `ffi.from_buffer(...)` for conversions, so that `bytearray`, `memoryview` and other things work too, instead of checking that the arguments are `bytes` instances. I would also prefer being able to give...
I don't know to which extent you plan to document less well known algorithms, but here is one that is crucial for designing cryptographic formats that do not reveal that...
AEAD schemes are vulnerable to an *invisible salamander* attack where one ciphextext may decrypt to many different plaintexts depending on the key used. The process involves creating at least two...
Monocypher's main source module does not implement SHA-512 and instead uses Blake2b in its sign and other "Ed25519" operations. This is completely incompatible with standard Ed25519 keys, which use SHA-512....
Hi, I wanted to inform you that we are getting a lot of feedback on PURBs and Padme, which are extremely popular among the cryptography community. We have independently developed...
This request is a combination of two additions to `ByteString` that apparently are not supported yet, or at least I could find no discussion of them. - Support any bytes-like...