UWCSESecurityLab / confidanteLinks
Usable encrypted email
☆12Updated 5 years ago
Alternatives and similar repositories for confidante
Users that are interested in confidante are comparing it to the libraries listed below
Sorting:
- Applet for testing ecc curves☆25Updated 6 years ago
- privacy-preserving attribute-based credentials engine☆80Updated 9 years ago
- Implementation of ECDAA☆23Updated 8 years ago
- Freely available cryptographic iconography☆67Updated 9 years ago
- A python library that implements a number of Privacy Enhancing Technolgies☆135Updated 3 years ago
- Javacard implementation of Curve25519 (prototype, work-in-progress)☆31Updated 4 years ago
- Open source Apis to access a Secure Element from a Web application☆17Updated 9 years ago
- Abandoned—Virtual FIDO U2F Token Chrome Extension☆62Updated 10 years ago
- ☆58Updated 8 years ago
- Privacy-preserving Tor statistics aggregation tool that implements the secret-sharing variant of the PrivEx algorithm.☆26Updated 5 years ago
- A toy provider implementing an expanded vigenere cipher, to serve as a programming example☆19Updated 8 months ago
- A CONIKS implementation in Java☆60Updated 7 years ago
- Software for "Quantum-Resistant Cryptosystems from Supersingular Elliptic Curve Isogenies"☆88Updated 6 years ago
- Distributed, tamper-resistant circumvention tools☆50Updated 9 years ago
- Secure multiparty messaging (kindof)☆21Updated 9 years ago
- ROCA: Infineon RSA key vulnerability☆492Updated 2 years ago
- axolotl based on libsodium☆22Updated 9 years ago
- An U2F Token implementation based on JavaCard☆15Updated 9 years ago
- Certificate Transparency RFC☆80Updated 4 years ago
- 👥 A Python post-quantum cryptography library☆65Updated 9 years ago
- Automated testing tool for algorithms from JavaCard API supported by particular smart card. Performance testing of almost all available m…☆133Updated 10 months ago
- U2F demo app for Android using NFC☆24Updated 10 years ago
- Post-quantum cryptography certificates☆77Updated this week
- The public repository of the Loopix mix system☆72Updated 8 years ago
- Links to stuff arising from or related to the HACS workshop.☆34Updated 8 years ago
- Tests support and behavior of elliptic curve cryptography implementations on JavaCards (TYPE_EC_FP and TYPE_EC_F2M) and in selected softw…☆83Updated 2 months ago
- A Shadow plug-in that runs the Tor anonymity software☆50Updated 4 years ago
- The Tor Path Simulator☆87Updated 9 years ago
- INTERLOCK - file encryption and HSM front-end☆305Updated last week
- Self-contained educational implementation of the BLISS-B Bimodal Lattice Signature Scheme☆17Updated 9 years ago