JanAhrens / threema-protocol-analysisView external linksLinks
"Threema protocol analysis" paper (including LaTeX sources)
☆18Oct 6, 2016Updated 9 years ago
Alternatives and similar repositories for threema-protocol-analysis
Users that are interested in threema-protocol-analysis are comparing it to the libraries listed below
Sorting:
- Sekurŝranko, an efficient and memory-safe Threema Safe server implementation in Rust.☆17Mar 27, 2025Updated 10 months ago
- Gateway MsgApi SDK - PHP☆15Nov 9, 2015Updated 10 years ago
- This gem provides access to the Threema Gateway API.☆11May 23, 2024Updated last year
- The protocol used for communicating between the Threema mobile apps and a remote application (e.g. Threema Web).☆25Apr 16, 2024Updated last year
- Threema App for Desktop (Windows/macOS/Linux).☆113Dec 9, 2025Updated 2 months ago
- A privacy-preserving digital version of punch cards used in store loyalty programs☆11Apr 19, 2021Updated 4 years ago
- A simple kernel module who hides a file by hooking the getdents64 syscall.☆10Aug 27, 2022Updated 3 years ago
- ☆10Apr 11, 2020Updated 5 years ago
- Benchmarks of all public available SNARK/STARK keccak circuits☆13Oct 1, 2023Updated 2 years ago
- small wiki engine based on static reST files and git for versionning☆25Oct 26, 2015Updated 10 years ago
- MIP21 example☆15Jun 20, 2022Updated 3 years ago
- Suffices of German town and village names☆10May 4, 2020Updated 5 years ago
- This repository aims to provide a reference implementation for updateable, secure embedded Linux systems that are built with the Yocto bu…☆12Nov 17, 2024Updated last year
- ☆10Mar 4, 2024Updated last year
- DODO smart contract on EVM☆10Mar 5, 2023Updated 2 years ago
- ☆12Oct 15, 2016Updated 9 years ago
- ⚖️ Freier Zugang zu unseren Gesetzen.☆14Jun 16, 2025Updated 7 months ago
- Advanced button handling crate☆11Nov 20, 2025Updated 2 months ago
- Usage samples for the VC-LTL.☆13Jun 29, 2019Updated 6 years ago
- Provisions: Privacy-preserving proofs of solvency for Bitcoin☆14Jan 10, 2016Updated 10 years ago
- Schnorr signatures over big curves for Ledger devices. group arithmetic & key derivation for unusual elliptic curves.☆13Apr 9, 2020Updated 5 years ago
- ActionScript 3, MXML, and Flex CSS3 parser☆10May 12, 2024Updated last year
- Implementation of the Fish and Begol signature schemes☆14Jul 3, 2017Updated 8 years ago
- Elliptic curve Go reference implementation☆26Feb 5, 2025Updated last year
- The technical paper for the Spark protocol☆11Mar 5, 2024Updated last year
- A LaTeX change tracking tool☆10Sep 19, 2025Updated 4 months ago
- Implements the Barreto-Naehrig (BN) curve as used by Ethereum☆12May 31, 2019Updated 6 years ago
- Summary for the Autonomous Mobile Robots course (2016) taught by Prof. Siegwart and others at ETH Zurich.☆10Aug 8, 2017Updated 8 years ago
- Intel-Process communitation☆10Feb 27, 2017Updated 8 years ago
- Demonstrate the new FileDispositionInfoEx behavior☆14Nov 6, 2017Updated 8 years ago
- Verify your NIPoPoWs efficiently, here☆11Dec 8, 2022Updated 3 years ago
- A tool to generate a freebsd cross compiler (gcc) in linux☆12Feb 20, 2012Updated 13 years ago
- Perform an arbitrary series of actions in the EVM in a single transaction.☆13Oct 21, 2024Updated last year
- Comparison of leading error-correcting code implementations☆12Aug 19, 2022Updated 3 years ago
- Unsafe 3-round MuSig in Python for experimentation☆11Jan 12, 2023Updated 3 years ago
- DUQU MALWARE SOURCE + BINARY + More coming☆12Feb 6, 2023Updated 3 years ago
- Loads NTDLL, parses the PE file, extracts "Zw" functions, retrieves their System Service Numbers (SSNs), and prints each function’s name,…☆15Apr 21, 2025Updated 9 months ago
- Generate a Latex Timetable Based on Calendar ics File☆12Feb 26, 2020Updated 5 years ago
- ☆19Nov 30, 2022Updated 3 years ago