DonnchaC / tor-hsdir-researchView external linksLinks
Modified version of Tor and associated tools for investigating the Hidden Service DHT. This research is old. Lots of work is being done to help fix these problems in Tor. Help out! https://blog.torproject.org/blog/hidden-services-need-some-love
☆11Oct 5, 2015Updated 10 years ago
Alternatives and similar repositories for tor-hsdir-research
Users that are interested in tor-hsdir-research are comparing it to the libraries listed below
Sorting:
- A privacy-preserving digital version of punch cards used in store loyalty programs☆11Apr 19, 2021Updated 4 years ago
- High Assurance Cryptographic Software☆10Dec 23, 2025Updated last month
- ☆10Nov 6, 2018Updated 7 years ago
- A collection of vulnerable web applications in Node.js to practice security fundamentals☆13May 5, 2016Updated 9 years ago
- [work in progress] Python framework for supporting cryptographic game-hopping proofs☆13Oct 19, 2022Updated 3 years ago
- OPAQUE asymmetric PAKE, and its threshold implementation. Experimental, not audited.☆17Jun 16, 2021Updated 4 years ago
- The anonymous credentials zoo☆16Mar 17, 2021Updated 4 years ago
- Stronger and Faster Side-Channel Protections for CSIDH☆20Dec 20, 2020Updated 5 years ago
- Go package to connect to Ledger devices☆19Aug 22, 2025Updated 5 months ago
- Implementations of a fast Elliptic-curve Diffie-Hellman primitive☆27Apr 13, 2015Updated 10 years ago
- ☆31Jan 15, 2026Updated 3 weeks ago
- The secure messaging summit information☆20Oct 27, 2020Updated 5 years ago
- CryptoBib Main Repository for Developers☆22Aug 21, 2024Updated last year
- A library for peer discovery inside the Tor network☆28Apr 19, 2024Updated last year
- Proof-of-concept implementation of the (V)OPRF protocol in https://datatracker.ietf.org/doc/draft-irtf-cfrg-voprf/☆23Aug 24, 2020Updated 5 years ago
- Specifications for Privacy Proxy Implementations☆32Feb 8, 2026Updated last week
- Planning for next generation secure chat.☆37Mar 12, 2015Updated 10 years ago
- Pointcheval Sanders signature☆27Jan 16, 2020Updated 6 years ago
- Lecture notes on the Foundations of Isogeny-based Cryptography☆32Sep 5, 2024Updated last year
- A C++ Implementation of Short Randomizable Signatures (PS Signatures) and EL PASSO (Privacy-preserving, Asynchronous Single Sign-On)☆26Jul 8, 2021Updated 4 years ago
- SQISign: Short Quaternion and Isogeny Signature – C implementation based on PARI/GP (obsolete implementation)☆27Feb 23, 2023Updated 2 years ago
- Example code for FIDO U2F authentication with the Lua module in nginx☆31Jun 14, 2015Updated 10 years ago
- Implementation of draft-irtf-cfrg-hpke☆30May 11, 2023Updated 2 years ago
- AppCoins is a blockchain-based protocol for the App Economy supported by the Aptoide App Store, and the first ICO serving 200 million us…☆12May 22, 2018Updated 7 years ago
- ☆38Dec 16, 2021Updated 4 years ago
- Verifying constant-time code with symbolic execution☆47Oct 26, 2021Updated 4 years ago
- Oblivious Pseudorandom Functions (OPRFs) using Prime-Order Groups☆38Sep 10, 2024Updated last year
- OnionTip is a web app which parses Tor relay data to allow users to tip volunteers for running relay in a fair and open way.☆53Mar 14, 2018Updated 7 years ago
- Easy to set up stationeers server inside a docker container.☆10May 23, 2023Updated 2 years ago
- A starter codebase for a Windrift game☆11Nov 20, 2021Updated 4 years ago
- My Privoxy configuration files☆27Apr 15, 2012Updated 13 years ago
- Ansible playbooks for the Deploying Docker Compose Applications article.☆11Jan 24, 2023Updated 3 years ago
- Ruby Client for Comprehensive Knowledge Archive Network☆20May 16, 2016Updated 9 years ago
- PC based on 65816☆16Jul 9, 2022Updated 3 years ago
- Old scripts that I keep around in case I need to bash something☆12Mar 25, 2015Updated 10 years ago
- GooSig: short signatures from RSA that hide the signer's RSA public key☆12Jan 8, 2020Updated 6 years ago
- A concise ChartPlotter/Navigator. A cross-platform ship-borne GUI application supporting * GPS/GPDS Postition Input * BSB Raster Chart Di…☆11Jan 8, 2026Updated last month
- A collection of short scripts for analysis, encryption and forensics, that can be used for CTF and/or security assessments☆10Sep 22, 2015Updated 10 years ago
- CIDR to IP List Tool☆14Mar 12, 2016Updated 9 years ago