Coda Hale
codahale
A real person.
Languages
Top Repositories
A tool for securely storing secrets on S3 using Amazon KMS.
This is not the Java library.
[ABANDONED] The Scala applewood bacon to Jackson's chicken breast: JSON cordon bleu.
A Java implementation of Shamir's Secret Sharing algorithm over GF(256).
A reasonably complete implementation of the Universal Scalability Law model.
lunk provides a set of tools for structured logging in the style of Google's Dapper or Twitter's Zipkin
Repositories
133A next-generation cryptographic framework based on the Keccak-f[1600, 12] permutation.
A reasonably complete implementation of the Universal Scalability Law model.
A Rust port of Filippo Valsorda’s Go implementation of ML-KEM-768.
A playground for cryptograpic permutations.
A duplex-based framework for cryptographic schemes.
A tool for securely storing secrets on S3 using Amazon KMS.
Lockstitch is an incremental, stateful cryptographic primitive for symmetric-key cryptographic operations (e.g. hashing, encryption, message authentication codes, and authenticated encryption) in complex protocols.
A Rust crate and CLI tool which simplifies calculation of Universal Scalability Law parameters given system measurements.
No description provided.
No description provided.
No description provided.
A Java implementation of Shamir's Secret Sharing algorithm over GF(256).
A Go implementation of RFC 6979's deterministic DSA/ECDSA signature scheme.
A puncturable PRF based on the RSA accumulator.
This is not the Java library.
A pure Go implementation of Shamir's Secret Sharing algorithm over GF(256)
My Emacs configuration.
A small tool to do the statistics legwork on benchmarks etc.
Where else you gonna scream?
[ABANDONED] The Scala applewood bacon to Jackson's chicken breast: JSON cordon bleu.
A Java library for validating passwords against NIST SP-800-63B requirements.
A Java implementation of the Gimli cryptographic permutation and hash algorithm.
Veil is an incredibly experimental post-quantum cryptosystem for sending and receiving confidential, authentic multi-recipient messages which are indistinguishable from random noise by an attacker.
A Go library and CLI tool for evaluating whether two or more sets of measurements are statistically different.
A private, transparent, authenticated key directory.
A fast random UUID generator.
yrgourd uses Lockstitch to establish mutually-authenticated, forward-secure, confidential, high-performance connections. Like a toy Wireguard.
lunk provides a set of tools for structured logging in the style of Google's Dapper or Twitter's Zipkin
No description provided.
charlie provides a fast, safe, stateless mechanism for adding CSRF protection to web applications.