Pinned Repositories
http-handlers
Some handy HTTP handlers for Go.
jerkson
[ABANDONED] The Scala applewood bacon to Jackson's chicken breast: JSON cordon bleu.
lockstitch
Lockstitch is an incremental, stateful cryptographic primitive for symmetric-key cryptographic operations (e.g. hashing, encryption, message authentication codes, and authenticated encryption) in complex protocols.
lunk
lunk provides a set of tools for structured logging in the style of Google's Dapper or Twitter's Zipkin
metrics
This is not the Java library.
shamir
A Java implementation of Shamir's Secret Sharing algorithm over GF(256).
sneaker
A tool for securely storing secrets on S3 using Amazon KMS.
sss
A pure Go implementation of Shamir's Secret Sharing algorithm over GF(256)
usl4j
A reasonably complete implementation of the Universal Scalability Law model.
veil
Veil is an incredibly experimental post-quantum cryptosystem for sending and receiving confidential, authentic multi-recipient messages which are indistinguishable from random noise by an attacker.
codahale's Repositories
codahale/shamir
A Java implementation of Shamir's Secret Sharing algorithm over GF(256).
codahale/tinystat
A Go library and CLI tool for evaluating whether two or more sets of measurements are statistically different.
codahale/usl
A Go library and CLI tool which simplifies calculation of Universal Scalability Law parameters given system measurements.
codahale/veil
Veil is an incredibly experimental post-quantum cryptosystem for sending and receiving confidential, authentic multi-recipient messages which are indistinguishable from random noise by an attacker.
codahale/veil-go
Stupid crypto tricks
codahale/yellhole
Where else you gonna scream?
codahale/nanostat
A Rust library and CLI tool for evaluating whether two or more sets of measurements are statistically different.
codahale/usl-rs
A Rust crate and CLI tool which simplifies calculation of Universal Scalability Law parameters given system measurements.
codahale/lockstitch
Lockstitch is an incremental, stateful cryptographic primitive for symmetric-key cryptographic operations (e.g. hashing, encryption, message authentication codes, and authenticated encryption) in complex protocols.
codahale/areion
A Rust implementation of the Areion256 and Areion512 permutations.
codahale/zk-cds
Hypothetical design of a zero-knowledge contact discovery system
codahale/eventflow
A high-throughput, low-latency, GCP-native, analytical event pipeline.
codahale/ml-kem-in-the-middle
Making ML-KEM-768 ciphertexts indistinguishable from random noise.
codahale/yrgourd
yrgourd uses Lockstitch to establish mutually-authenticated, forward-secure, confidential, high-performance connections. Like a toy Wireguard.
codahale/gubbins
codahale/xoodoo-p
High-performance, pure-Rust implementation of the Xoodoo-p permutation.
codahale/bakery
Hacky project for generating websites.
codahale/belvedere
A small lookout tower (usually square) on the roof of a house.
codahale/blind
Short Pairing-Free Blind Signatures with Exponential Security
codahale/commit
Pedersen commitments with Ristretto255 and STROBE.
codahale/cpace
A CPACE-inspired PAKE using ristretto255 and STROBE.
codahale/cyclist
A generic Rust implementation of the Cyclist mode of permutation-based cryptography (e.g. Xoodyak).
codahale/keccak-p
High-performance, pure-Rust implementation of the Keccak-p permutation.
codahale/qdsa
A pure-Rust implementation of the qDSA signature algorithm over Curve25519, plus X25519 and Elligator2.
codahale/rsa_pprf
A puncturable PRF based on the RSA accumulator.
codahale/sag
A Ristretto255 implementation of Spontaneous Anonymous Group signatures (aka ring signatures)
codahale/vrf
Ristretto255/STROBE-based VRF
codahale/pqc-signcrypt
An entirely untested, unproven post-quantum signcryption scheme.
codahale/elligator-squared
An implementation of the Elligator Squared algorithm for NIST P-256.
codahale/mlkem768
A Rust port of Filippo Valsorda’s Go implementation of ML-KEM-768.