UCL-InfoSec / sphinxLinks
Python implementation of the Sphinx mix format. - Paper: http://www.cypherpunks.ca/~iang/pubs/Sphinx_Oakland09.pdf
☆15Updated 6 years ago
Alternatives and similar repositories for sphinx
Users that are interested in sphinx are comparing it to the libraries listed below
Sorting:
- PANORAMIX repo☆20Updated 2 years ago
- (Oblivious) DoH Server☆26Updated 3 years ago
- secure messaging, file-transfer, and directory synchronization☆41Updated 7 years ago
- Regenerable ed25519 keys for OpenSSH and OpenPGP.☆36Updated 5 years ago
- Generic anonymous routing protocol framework agnostic to encryption algorithm and transport layer☆15Updated 7 years ago
- tamper resistant audit log☆18Updated 6 years ago
- Mirror of freehaven's anonymous research bibliography☆14Updated 10 years ago
- NXP Security Controller (SCCv2) - Linux driver☆19Updated 4 months ago
- Privacy-preserving Tor statistics aggregation tool that implements the secret-sharing variant of the PrivEx algorithm.☆26Updated 4 years ago
- library for implementing the server side of the mix network: mixes and providers☆26Updated 2 years ago
- System tuning recommendations for running cryptographic applications☆23Updated 9 years ago
- A utility to track the performance of Tor and Tor onion services☆19Updated 6 years ago
- Reference implementations of post-quantum cryptographic primitives☆29Updated last year
- Supporting materials for our EuroS&P paper: Automated Verification for Secure Messaging Protocols and their Implementations: A Symbolic a…☆36Updated 3 years ago
- A core and experimental implementation of ClaimChain☆34Updated 6 years ago
- An hash-chain with efficient O(1) append and O(logN) proof.☆14Updated 7 years ago
- Signcryption using libsodium.☆65Updated last year
- Mix Network Bibliography☆15Updated 5 years ago
- Source Code Transparency☆11Updated last year
- Deterministic/nonce-reuse resistant authenticated encryption scheme using XChaCha20, implemented on libsodium.☆29Updated 10 months ago
- Analysis of archived Tor relay RSA public keys☆24Updated 7 years ago
- :e-mail: A simple Cypherpunk message preprocessor that makes it easy to chain Type I anonymous remailers together.☆35Updated 9 years ago
- A user-first approach to threat modeling.☆17Updated last month
- Implementation and simulations for the "Reducing Metadata Leakage from Encrypted Data and Communication with PURBs" paper☆30Updated last year
- BAT KEM/Signature Reference Implementation☆22Updated 3 years ago
- Pong revolution.☆13Updated 5 years ago
- A machine learning data analysis pipeline for analyzing website fingerprinting attacks and defenses.☆30Updated 8 years ago
- Entity Attestation Token IETF Draft Standard☆18Updated 2 months ago
- Command-line utility to control Tor.☆89Updated last year
- End-to-End encrypted Tor2Web gateway☆37Updated 4 years ago