Search results
21 packages found
Sort by: Default
- Default
- Most downloaded this week
- Most downloaded this month
- Most dependents
- Recently published
A Hybrid Public Key Encryption (HPKE) module for various JavaScript runtimes
A Hybrid Public Key Encryption (HPKE) module extension for ChaCha20/Poly1305
Fast, reliable cipher, hash and hmac methods executed in Node's threadpool for multi-core throughput.
- aes
- aead
- async
- asynchronous
- blake
- chacha20-poly1305
- cipher
- cipheriv
- crypto
- ctr
- decipher
- decipheriv
- event loop
- gcm
- View more
rweather/noise-c compiled to WebAssembly using Emscripten and optimized for small size
Node.js module which provides OpenSSL bindings for AEAD ciphers
wrapper of Zenroom, a secure and small virtual machine for crypto language processing
- zenroom
- crypto-language-processing
- virtual-machine
- blockchain
- crypto
- ecc
- dyne
- ecdh
- ecdsa
- zero-knowledge-proofs
- javascript
- npm
- ecp2
- miller-loop
- View more
rweather/noise-c compiled to WebAssembly using Emscripten and optimized for small size
A framework for building composable proxy protocol stack
- socks5
- socks4
- socks4a
- http
- http2
- https
- tls
- websocket
- protocol
- secure
- proxy
- nodejs
- blinksocks
- shadowsocks
- View more
TypeScript implementation of Ascon v1.2, an authenticated cipher and hash function http://ascon.iaik.tugraz.at/.
Streaming authenticated encryption using ChaCha20-Poly1305
Pull stream of authenticated encryption ChaCha20-Poly1305
- stream
- streaming
- pull
- pull-stream
- aead
- crypto
- cryptography
- chacha20-poly1305
- chacha20poly1305
- authenticated
- encryption
Check whether a chacha20-poly1305 cipher is supported by NodeJS
Fast, reliable cipher, hash and hmac methods executed in Node's threadpool for multi-core throughput.
- aes
- aead
- async
- asynchronous
- blake
- chacha20-poly1305
- cipher
- cipheriv
- crypto
- ctr
- decipher
- decipheriv
- event loop
- gcm
- View more
Authenticated encryption on arbitrary large files
Buffer encryption, using aead (authenticated encryption with associated data), powered by strong crypto algorithms.
Encrypt and decrypt strings using handshake names and their associated keys.
Authenticated Encryption with AES-CBC and HMAC-SHA2
- crypto
- authenticated encryption
- authentication tag
- aes
- aead
- jwa
- hmac
- aes-128-cbc-hmac-sha-256
- aes-192-cbc-hmac-sha-384
- aes-256-cbc-hmac-sha-512
- aes-256-cbc-hmac-sha-384
DARE combines a modern AE scheme with a simple reordering protection mechanism to build a tamper-resistant encryption scheme.
Gimli is a 384-bit permutation designed to achieve high security with high performance across a broad range of platforms, including 64-bit Intel/AMD server CPUs, 64-bit and 32-bit ARM smartphone CPUs, 32-bit ARM microcontrollers, 8-bit AVR microcontroller
High-level, misuse-resistant secret key-based cipher library using platform-native AEAD algorithms