npm package discovery and stats viewer.

Discover Tips

  • General search

    [free text search, go nuts!]

  • Package details

    pkg:[package-name]

  • User packages

    @[username]

Sponsor

Optimize Toolset

I’ve always been into building performant and accessible sites, but lately I’ve been taking it extremely seriously. So much so that I’ve been building a tool to help me optimize and monitor the sites that I build to make sure that I’m making an attempt to offer the best experience to those who visit them. If you’re into performant, accessible and SEO friendly sites, you might like it too! You can check it out at Optimize Toolset.

About

Hi, 👋, I’m Ryan Hefner  and I built this site for me, and you! The goal of this site was to provide an easy way for me to check the stats on my npm packages, both for prioritizing issues and updates, and to give me a little kick in the pants to keep up on stuff.

As I was building it, I realized that I was actually using the tool to build the tool, and figured I might as well put this out there and hopefully others will find it to be a fast and useful way to search and browse npm packages as I have.

If you’re interested in other things I’m working on, follow me on Twitter or check out the open source projects I’ve been publishing on GitHub.

I am also working on a Twitter bot for this site to tweet the most popular, newest, random packages from npm. Please follow that account now and it will start sending out packages soon–ish.

Open Software & Tools

This site wouldn’t be possible without the immense generosity and tireless efforts from the people who make contributions to the world and share their work via open source initiatives. Thank you 🙏

© 2026 – Pkg Stats / Ryan Hefner

mldsa-wasm-rs

v0.2.0

Published

ML-DSA (FIPS 204) digital signatures via Rust/WASM

Readme

mldsa.wasm

Post-quantum digital signatures for the web. ML-DSA (FIPS 204) compiled to WebAssembly, with TypeScript bindings and a native Rust API.

ML-DSA (formerly CRYSTALS-Dilithium) is NIST's standardized post-quantum signature scheme.

This repository provides all three parameter sets as standalone npm packages.

And a unified Rust crate, built on ml-dsa by RustCrypto.

Packages

Rust (crates.io)

| Crate | Description | |-----------------------------------------------------|----------------------------| | mldsa44 | ML-DSA-44 (NIST Level 2) | | mldsa65 | ML-DSA-65 (NIST Level 3) | | mldsa87 | ML-DSA-87 (NIST Level 5) | | mldsa-core | Shared core implementation |

npm

| Package | Security Level | npm | |----------------------------------------------------------------|----------------|-----------------------------| | mldsa44-wasm | NIST Level 2 | npm install mldsa44-wasm | | mldsa65-wasm | NIST Level 3 | npm install mldsa65-wasm | | mldsa87-wasm | NIST Level 5 | npm install mldsa87-wasm | | mldsa-wasm-rs | All variants | npm install mldsa-wasm-rs |

Parameter sets

| Variant | Security Level | Seed | Verifying Key | Signature | |-----------|----------------|------|---------------|-------------| | ML-DSA-44 | NIST Level 2 | 32 B | 1,312 bytes | 2,420 bytes | | ML-DSA-65 | NIST Level 3 | 32 B | 1,952 bytes | 3,309 bytes | | ML-DSA-87 | NIST Level 5 | 32 B | 2,592 bytes | 4,627 bytes |

Rust

Each variant is a standalone crate:

[dependencies]
mldsa65 = "0.1.0"
use mldsa65::*;
 
let kp = generate_keypair();
let sig = sign(&kp.seed, b"hello");
assert!(verify(&kp.verifying_key, b"hello", &sig));

Multiple variants:

[dependencies]
mldsa44 = "0.1"
mldsa65 = "0.1"
mldsa87 = "0.1"
let kp44 = mldsa44::generate_keypair();
let kp65 = mldsa65::generate_keypair();
let kp87 = mldsa87::generate_keypair();

Building

Prerequisites

rustup target add wasm32-unknown-unknown
cargo install wasm-bindgen-cli

JavaScript / TypeScript

Standalone packages

npm install mldsa65-wasm
import { Signer, verify } from 'mldsa65-wasm';

//=========== Safe (seed lives inside WASM memory) ===========

// seed is a base64-encoded 32-byte value that deterministically derives the ML-DSA keypair.
// You are responsible for providing it. Store it securely and never expose it!
// The seed stays inside WASM memory and is zeroized when the Signer is freed or garbage collected.
const signer = new Signer(seed);

// Sign a message
const sig = signer.sign(new TextEncoder().encode('hello'));
// seed zeroized when signer is GC'd

// With optional context (per ML-DSA spec)
const sigWithCtx = signer.sign(new TextEncoder().encode('hello'), new TextEncoder().encode('ctx'));

const vk = signer.verifyingKey();

// Verify
const valid = verify(vk, new TextEncoder().encode('hello'), sig);
console.log(valid); // true

//=========== !WARNING! - UNSAFE ===========

// generateKeypair generates a fresh random seed via the system RNG.
// The seed is returned to JS memory.
// You are responsible for zeroizing it after use.
import { generateKeypair, sign } from 'mldsa65-wasm';

// Generate a keypair
const { seed, verifyingKey } = generateKeypair();

// Sign a message (deterministic but unsafe)
const signature = sign(seed, new TextEncoder().encode('hello'));

// Verify
const valid = verify(verifyingKey, new TextEncoder().encode('hello'), signature);
console.log(valid); // true

Unified package with subpath exports

npm install mldsa-wasm-rs
import { Signer, generateKeypair, sign, verify } from 'mldsa-wasm-rs/65';
// or
import { Signer, generateKeypair, sign, verify } from 'mldsa-wasm-rs/44';
import { Signer, generateKeypair, sign, verify } from 'mldsa-wasm-rs/87';

Memory management: In all modern browsers (and wasm-bindgen ≥ 0.2.91), WASM memory is freed automatically via the TC39 weak references proposal when the JS object goes out of scope.

In practice, you often don't need to think about this. For deterministic cleanup or environments without weak reference support (older browsers, some Node.js setups), use using (TypeScript 5.2+ / ES2026) or call .free() manually.

Never call .free() on a using-managed instance otherwise it will double-free.

Native tests

cargo test --workspace

WASM tests

# Single variant
make test-wasm65
 
# All variants
make test-wasm

Build npm packages

# Single variant
make wasm65
 
# All variants + unified package
make wasm
 
# Run all tests (native + wasm)
make test-all

Build npm packages

# Build a single variant
make wasm

# Build all variants + unified package
make wasm-all

# Run all tests (native + wasm)
make test-all

Security

  • Deterministic signing | No randomness required at sign time, eliminating a class of implementation bugs
  • Zeroized secrets | Seed is zeroized on drop via zeroize
  • No unsafe code
  • FIPS 204 compliant | Built on ml-dsa by RustCrypto

This library has not been independently audited. Use in production at your own risk.

License

Dual-licensed under the MIT License or Apache-2.0 License.