×
思维导图备注
Documentation for libsodium
首页
下载
阅读记录
书签管理
我的书签
添加书签
移除书签
Secret-key cryptography
来源 jedisct1
浏览
14
扫码
分享
2025-02-11 19:39:59
Secret-key cryptography
Secret-key cryptography
上一篇:
下一篇:
Introduction
Installation
Quickstart and FAQ
Projects using libsodium
Commercial support
Bindings for other languages
Usage
Helpers
Padding
Secure memory
Generating random data
Secret-key cryptography
Authenticated encryption
Encrypted streams and file encryption
Encrypting a set of related messages
Authentication
AEAD constructions
ChaCha20-Poly1305
Original ChaCha20-Poly1305 construction
IETF ChaCha20-Poly1305 construction
XChaCha20-Poly1305 construction
AEGIS-256
AEGIS-128L
AES256-GCM
AES256-GCM with precomputation
Public-key cryptography
Authenticated encryption
Public-key signatures
Sealed boxes
Hashing
Generic hashing
Short-input hashing
Password hashing
The pwhash* API
Key derivation
HKDF
Key exchange
Advanced
SHA-2
HMAC-SHA-2
The Scrypt function
Point*scalar multiplication
One-time authentication
Stream ciphers
ChaCha20
XChaCha20
Salsa20
XSalsa20
Ed25519 to Curve25519
Finite field arithmetic
Ristretto
Custom RNG
Internals
Roadmap
Multiple recipients
The AEGIS family of authenticated ciphers
暂无相关搜索结果!
本文档使用
Sou.st
构建
×
分享,让知识传承更久远
×
文章二维码
手机扫一扫,轻松掌上读
×
文档下载
请下载您需要的格式的文档,随时随地,享受汲取知识的乐趣!
PDF
文档
EPUB
文档
MOBI
文档
×
书签列表
×
阅读记录
阅读进度:
0.00%
(
0/0
)
重置阅读进度