UCL-InfoSec / sphinx
Python implementation of the Sphinx mix format. - Paper: http://www.cypherpunks.ca/~iang/pubs/Sphinx_Oakland09.pdf
☆15Updated 5 years ago
Alternatives and similar repositories for sphinx
Users that are interested in sphinx are comparing it to the libraries listed below
Sorting:
- PANORAMIX repo☆20Updated 2 years ago
- (Oblivious) DoH Server☆26Updated 3 years ago
- tamper resistant audit log☆18Updated 6 years ago
- Mirror of freehaven's anonymous research bibliography☆14Updated 10 years ago
- Mix Network Bibliography☆15Updated 5 years ago
- Regenerable ed25519 keys for OpenSSH and OpenPGP.☆36Updated 5 years ago
- secure messaging, file-transfer, and directory synchronization☆41Updated 7 years ago
- repository for tracking open tasks☆18Updated 7 years ago
- An hash-chain with efficient O(1) append and O(logN) proof.☆14Updated 6 years ago
- A utility to track the performance of Tor and Tor onion services☆19Updated 6 years ago
- library for implementing the server side of the mix network: mixes and providers☆26Updated 2 years ago
- Supporting materials for our EuroS&P paper: Automated Verification for Secure Messaging Protocols and their Implementations: A Symbolic a…☆36Updated 2 years ago
- System tuning recommendations for running cryptographic applications☆23Updated 8 years ago
- reading lists☆31Updated 6 years ago
- A user-first approach to threat modeling.☆17Updated last week
- Sign JSON objects with ED25519 signatures☆12Updated 2 years ago
- A core and experimental implementation of ClaimChain☆34Updated 6 years ago
- Generic anonymous routing protocol framework agnostic to encryption algorithm and transport layer☆15Updated 6 years ago
- NXP Security Controller (SCCv2) - Linux driver☆19Updated 2 months ago
- Auditing Applied Cryptography☆10Updated 5 years ago
- End-to-End encrypted Tor2Web gateway☆38Updated 4 years ago
- Simple TPM utils in Python for generating random numbers & RSA keys☆19Updated 8 years ago
- I2P bindings for Twisted.☆15Updated 2 years ago
- Deterministic/nonce-reuse resistant authenticated encryption scheme using XChaCha20, implemented on libsodium.☆29Updated 9 months ago
- ☆10Updated 6 years ago
- Privacy-preserving Tor statistics aggregation tool that implements the secret-sharing variant of the PrivEx algorithm.☆26Updated 4 years ago
- A password-based implementation of threshold encryption☆32Updated 12 years ago
- Entity Attestation Token IETF Draft Standard☆18Updated 3 weeks ago
- A simple cryptosystem that provides provable plausibly deniable encryption.☆89Updated 6 years ago
- ☆8Updated 4 years ago