ahf / hashvisLinks
Rust Program for Deterministic Generation of Random Art.
☆49Updated 5 years ago
Alternatives and similar repositories for hashvis
Users that are interested in hashvis are comparing it to the libraries listed below
Sorting:
- Command line program for secret-sharing strings☆76Updated 2 years ago
- Network summary, design, and connectivity information.☆16Updated 5 months ago
- katzenpost mix network encrypted messaging client library☆43Updated 2 years ago
- A pure Rust implementation of the Minisign signature tool.☆95Updated 4 months ago
- reading lists☆31Updated 6 years ago
- Deterministic/nonce-reuse resistant authenticated encryption scheme using XChaCha20, implemented on libsodium.☆29Updated 9 months ago
- An investigation into Jacob Appelbaum leaving the Tor Project☆97Updated last year
- Bram's steganographic framework☆488Updated 11 years ago
- Challenge Bypass using the Ristretto group☆35Updated last week
- Rust bindings and key exchange for liboqs (Open Quantum Safe), a library for quantum-resistant cryptographic algorithms☆36Updated 4 years ago
- A design for doing more private Signal groups using anonymous credentials based on algebraic MACs.☆14Updated 5 years ago
- Infinitely presentable (aeon) rerandomisable (flux) anonymous credentials.☆28Updated 4 years ago
- <RPC (HATEOAS) actions on a universally addressable publickey>. Copernica is a transport agnostic, privacy preserving, Information-centri…☆11Updated 2 years ago
- (Oblivious) DoH Server☆26Updated 3 years ago
- Markdown version of Cyperhnomicon☆41Updated 4 years ago
- Command-line utility to control Tor.☆89Updated last year
- Regenerable ed25519 keys for OpenSSH and OpenPGP.☆36Updated 5 years ago
- End-to-End encrypted Tor2Web gateway☆38Updated 4 years ago
- Mirror of all PDFs from the IACR's eprint☆46Updated last year
- Rust library for OpenTimestamps☆63Updated 2 years ago
- Mirror of freehaven's anonymous research bibliography☆14Updated 10 years ago
- secure messaging, file-transfer, and directory synchronization☆41Updated 7 years ago
- Non-C Implementations of the yescrypt KDF.☆29Updated 6 years ago
- Codechain — code trust through hash chains☆47Updated 3 years ago
- ☆18Updated last year
- A user-first approach to threat modeling.☆17Updated last month
- generate pgp keys with vanity fingerprints☆18Updated 8 years ago
- Defiant advertisement network for DeFi☆38Updated 5 years ago
- Pong revolution.☆13Updated 5 years ago
- Bundle and run Tor inside your own project☆103Updated 2 years ago