UWCSESecurityLab / confidanteLinks
Usable encrypted email
☆12Updated 4 years ago
Alternatives and similar repositories for confidante
Users that are interested in confidante are comparing it to the libraries listed below
Sorting:
- Abandoned—Virtual FIDO U2F Token Chrome Extension☆62Updated 9 years ago
- Implementation of ECDAA☆23Updated 7 years ago
- privacy-preserving attribute-based credentials engine☆80Updated 9 years ago
- A CONIKS implementation in Java☆61Updated 6 years ago
- A python library that implements a number of Privacy Enhancing Technolgies☆135Updated 2 years ago
- Freely available cryptographic iconography☆66Updated 8 years ago
- Applet for testing ecc curves☆25Updated 6 years ago
- Certificate Transparency RFC☆80Updated 4 years ago
- The public repository of the Loopix mix system☆72Updated 7 years ago
- A Shadow plug-in that runs the Tor anonymity software☆50Updated 4 years ago
- Privacy-preserving Tor statistics aggregation tool that implements the secret-sharing variant of the PrivEx algorithm.☆26Updated 4 years ago
- Distributed, tamper-resistant circumvention tools☆50Updated 9 years ago
- A utility to track the performance of Tor and Tor onion services☆19Updated 6 years ago
- Applet for the SIGILANCE OpenPGP Smart Card☆10Updated 10 years ago
- ☆58Updated 8 years ago
- A server-side Website Fingerprinting defence called "Application Layer Padding Concerns Adversaries"☆11Updated 6 years ago
- U2F demo app for Android using NFC☆24Updated 10 years ago
- ☆46Updated last month
- The Tor Path Simulator☆87Updated 8 years ago
- Secure multiparty messaging (kindof)☆21Updated 9 years ago
- Javacard implementation of Curve25519 (prototype, work-in-progress)☆31Updated 4 years ago
- DEPRECATED – See NOTICE below about migration to new repository – Post-quantum key exchange from the ring learning with errors problem☆59Updated 8 years ago
- Lightweight program that pollinates STHs between Certificate Transparency logs and auditors☆26Updated 3 weeks ago
- Open source Apis to access a Secure Element from a Web application☆17Updated 8 years ago
- Torbutton for Thunderbird and related *bird forks☆84Updated 6 years ago
- Files of IRTF HRPC research group☆19Updated 6 years ago
- ☆33Updated 4 years ago
- ROCA: Infineon RSA key vulnerability☆485Updated last year
- APRICOT: Advanced Protocols for Real-world Implementation of Computational Oblivious Transfers☆16Updated 8 years ago
- A Java PKCS#11 wrapper and JCE Provider☆23Updated 5 years ago