-
```
_sync:2 Uncaught Error: Cannot find module './src/cipherSuite.js'
at webpackEmptyContext (_sync:2:10)
at eval (mod.js:30:28)
at eval (mod.js:17:17)
at eval (mod.js:26:3)
…
OR13 updated
4 months ago
-
At time of writing, the "primary" HPKE config for a task (used for encryption, passed to clients when they request the current HPKE config, prioritized for decryption) is determined as the HPKE config…
-
This is a tracking issue for KEMs we could potentially add to this repo:
- [ ] [ML-KEM ("Kyber")](https://pq-crystals.org/kyber/)
- [ ] [X25519Kyber768 ("Xyber768")](https://www.ietf.org/archive/i…
-
There is an existing implementation of the [RFC 9180](https://www.rfc-editor.org/rfc/rfc9180.html) Hybrid Public Key Encryption in Rust: https://crates.io/crates/hpke
But this implementation lacks …
-
As an implementor, what I really want to know is how COSE data structures go in and out of the HPKE Seal() and Open() APIs. These APIs are THE definition of HPKE.
I would write a section, maybe as …
-
@hannestschofenig @selfissued @OR13 and other folks,
I think Orie also mentioned this in another issur/PR, but how about providing test vectors in the COSE-HPKE spec?
Since the COSE specs are re…
-
`Scheme.DeriveKeyPair` panics if the length of the seed is different from `Scheme.SeedSize`. However, this is too strict: there are use-cases for passing a seed larger than the hash size, for instance…
-
Daisuke wrote:
> At the very least, until now, I believed that the `info` value for HPKE should be an empty string. The reason is that HPKE interface used in COSE is essentially the Single-shot API…
-
The new task page doesn't provide guidance on how I can acquire/generate a collector HPKE key.
If adopting https://github.com/divviup/divviup-api/issues/378, we can consider having the key generate…
-
What users want to do is encrypt data and send it.
What we make them do is jump through many explicit calls with mind-boggling error handling and handle serialization themselves. For TLS its even w…