IRTF-PEARG / draft-ip-address-privacyLinks
Internet-Draft on IP address privacy
☆17Updated 3 months ago
Alternatives and similar repositories for draft-ip-address-privacy
Users that are interested in draft-ip-address-privacy are comparing it to the libraries listed below
Sorting:
- Specifications for Privacy Proxy Implementations☆31Updated 2 weeks ago
- (Oblivious) DoH Server☆26Updated 3 years ago
- ☆24Updated 9 months ago
- XChaCha8Blake3Siv is a nonce-reuse misuse-resistant (NRMR) and key-committing authenticated encryption with associated data (AEAD) algori…☆17Updated 3 years ago
- A design for doing more private Signal groups using anonymous credentials based on algebraic MACs.☆14Updated 5 years ago
- Elliptic curves Rust reference implementation☆16Updated last year
- Deterministic/nonce-reuse resistant authenticated encryption scheme using XChaCha20, implemented on libsodium.☆29Updated 11 months ago
- Differential fuzzing for elliptic curves☆23Updated last year
- ☆19Updated 5 years ago
- An implementation of the OPAQUE password-authenticated key exchange protocol☆10Updated 2 months ago
- A Prio server implementation.☆71Updated last year
- This document describes the Distributed Aggregation Protocol (DAP) being developed by the PPM working group at IETF.☆50Updated this week
- Oblivious Pseudorandom Functions (OPRFs) using Prime-Order Groups☆38Updated 10 months ago
- Geolocate your files!☆16Updated 3 years ago
- Entity Attestation Token IETF Draft Standard☆18Updated 2 months ago
- ☆18Updated last year
- Signature-based Resource Loading Restrictions☆39Updated last month
- Certificate Revocation List monitor☆43Updated 11 months ago
- OpenSSF Project Template☆18Updated last year
- VDAF specification☆23Updated 3 weeks ago
- A privacy-preserving digital version of punch cards used in store loyalty programs☆11Updated 4 years ago
- A tool for linear and differential cryptanalysis of block ciphers written in Rust☆13Updated 2 years ago
- Reference implementations of post-quantum cryptographic primitives☆29Updated last year
- A user-first approach to threat modeling.☆17Updated 2 months ago
- OCSP Responder monitor☆37Updated 11 months ago
- Agenda/Minutes of Anti-Fraud Community Group meetings.☆19Updated 3 weeks ago
- Docker image: DNS over HTTPS proxy☆11Updated 5 years ago
- GPU code for the first SHA-1 collision attack and two freestart attacks☆14Updated 5 years ago
- Oblivious HTTP implementation☆31Updated last year
- BAT KEM/Signature Reference Implementation☆22Updated 3 years ago