GaloisInc / e2eviv
Artifacts associated with the U.S. Vote Foundation's E2E-VIV Project (end-to-end verifiable internet voting).
☆17Updated 6 years ago
Alternatives and similar repositories for e2eviv:
Users that are interested in e2eviv are comparing it to the libraries listed below
- Keyname format for public-key fingerprints☆22Updated 10 years ago
- Haskell implementation of the InterPlanetary File System☆14Updated 10 years ago
- authenticated data structures, generically☆51Updated 8 years ago
- Links to stuff arising from or related to the HACS workshop.☆35Updated 7 years ago
- ☆59Updated 2 years ago
- Authenticated encryption scheme prover/synthesizer☆15Updated 2 years ago
- Semantics for Cryptol☆16Updated 6 years ago
- Mirror of http://sourceforge.net/p/ed448goldilocks/code/ci/master/tree/☆33Updated 9 years ago
- IPython-style interaction for Cryptol☆15Updated 8 years ago
- A Haskell library implementing the Noise protocol.☆98Updated 2 months ago
- A functional smart contract system☆6Updated 6 years ago
- Explicitly Typed exceptions as a library☆22Updated 4 years ago
- The security-centric web platform framework☆52Updated 8 years ago
- Elliptic Curve Cryptography in Haskell☆13Updated last year
- Double ratchet algorithm for E2E encryption☆59Updated 6 years ago
- Multihash Haskell implementation☆27Updated last year
- ☆16Updated 9 years ago
- This repo is deprecated -> goto https://github.com/NixIPFS;☆12Updated 8 years ago
- TLS implemented in f7☆43Updated 8 years ago
- A core and experimental implementation of ClaimChain☆34Updated 6 years ago
- Blockchain Technology for the Working Mathematician☆24Updated 7 years ago
- convert simple cryptol expressions into finite-state machines☆20Updated 7 years ago
- Various crypto utilities for dealing with MACs, Signatures, and PGP message formats.☆30Updated 6 years ago
- Web2Native Bridge emulator for Chrome and Firefox (Desktop)☆10Updated last year
- A haskell library implementing the Kademlia DHT☆43Updated 6 years ago
- Haskell Equational Reasoning Model-to-Implementation Tunnel☆48Updated 2 years ago
- A tool for privacy-preserving identity management (PPIM)☆56Updated 8 years ago
- A tool for the automatic generation of Isabelle/HOL correctness proofs for security protocols.☆16Updated 9 years ago
- SPHINCS-256 practical stateless hash-based signature scheme☆26Updated 8 years ago
- Supporting materials for our EuroS&P paper: Automated Verification for Secure Messaging Protocols and their Implementations: A Symbolic a…☆36Updated 2 years ago