-
First, thank you so much for compiling this list. šš I just wish I'd found this earlier : )
(EDIT: I found the sentence "_So it's important to emphasise that AES-GCM-SIV (and nonce-misuse resistanā¦
-
**Help us help you**
Out tink configuration uses 2.2 with a few small build patch for a conflicting RapidJSON installation.
** Bug report **
We use a very up to date version of Ubuntu (24.04ā¦
-
The documentation for AES-GCM-SIV references [a preprint](https://eprint.iacr.org/2017/168) and [a draft RFC](https://tools.ietf.org/html/draft-irtf-cfrg-gcmsiv-06). Since then, the spec has been formā¦
-
A test I have started failing recently when using AES-GCM-SIV with empty plaintexts.
The failing test is
```
from cryptography.hazmat.primitives.ciphers import aead
import cryptography
import sā¦
-
Currently we support:
* AES-SIV (deterministic)
* AES-GCM (not deterministic)
* AES-GCM-SIV (in progress, not deterministic)
In the initial implementation of enprot (`--pbkdf legacy --cipher aesā¦
-
https://tools.ietf.org/html/rfc8452
(Sorry for original title typo)
-
**Describe the bug:**
Apologies, I couldnāt find a direct way to report documentation bugs.
The [documentation](https://developers.google.com/tink/aead#choose_a_key_type) for the `AEAD` primitivā¦
-
I also can't find aes-gcm-siv implementations in other popular python projects like [tink](https://github.com/google/tink) and [cryptography](https://github.com/pyca/cryptography), only a sample [scriā¦
-
According to [@agl__](https://twitter.com/agl__/status/1118669601129189376), this would reduce the impact of nonce-reuse (referenced in https://github.com/dotnet/corefx/issues/7023#issuecomment-199605ā¦
-
Looking at [libsodium docs](https://doc.libsodium.org/secret-key_cryptography/aead/chacha20-poly1305/xchacha20-poly1305_construction),
> Unlike other variants directly using the ChaCha20 cipher, geā¦