benlaurie / objecthashLinks
A way to cryptographically hash objects (in the JSON-ish sense) that works cross-language. And, therefore, cross-encoding.
☆148Updated 2 years ago
Alternatives and similar repositories for objecthash
Users that are interested in objecthash are comparing it to the libraries listed below
Sorting:
- Macaroons are flexible authorization credentials that support decentralized delegation, attenuation, and verification.☆496Updated 4 years ago
- YubiHSM2-backed signing server☆210Updated 6 years ago
- An experimental cooperative keyserver based on ideas from dename.☆107Updated 8 years ago
- Testing compatibility between macaroon libraries☆17Updated 8 years ago
- Constant-Time Toolkit☆296Updated 6 years ago
- A CONIKS implementation in Java☆60Updated 6 years ago
- Noise Specification☆455Updated 6 years ago
- Meta-repository for Miscreant: misuse-resistant symmetric encryption library with AES-SIV (RFC 5297) and AES-PMAC-SIV support☆475Updated 5 years ago
- [DEPRECATED] - Apache Milagro Crypto Incubator☆63Updated 6 years ago
- ☆58Updated 8 years ago
- A memory-hard password hashing function.☆69Updated 2 years ago
- Securely locate peers without central servers☆152Updated 8 years ago
- Totally Isolated TLS Unwrapping Server☆111Updated 4 years ago
- A Rust implementation of the Message Layer Security group messaging protocol☆115Updated last year
- Interactive visualization framework for Runway models of distributed systems☆186Updated 3 years ago
- On Ends-to-Ends Encryption: Asynchronous Group Messaging with Strong Security Guarantees☆267Updated 3 years ago
- SPHINCS-256 practical stateless hash-based signature scheme☆26Updated 8 years ago
- Kivaloo is a collection of utilities which together form a data store associating keys of up to 255 bytes with values of up to 255 bytes.☆202Updated 4 months ago
- Sphinx-based Password Storage low-level library☆130Updated 5 months ago
- ☆64Updated 9 months ago
- Hubs operate at layer one; switches operate at layer two.☆13Updated 9 years ago
- A cryptographically verifiable access control and directory system for Linux servers☆54Updated 8 years ago
- Links to stuff arising from or related to the HACS workshop.☆34Updated 7 years ago
- A CONIKS implementation in Golang☆115Updated 2 years ago
- Reference implementations (software)☆85Updated 8 years ago
- Supersingular Isogeny Diffie-Hellman in Go☆136Updated 5 years ago
- specification and design documents☆54Updated 2 years ago
- SC4 - Strong Crypto for Mere Mortals☆122Updated 3 years ago
- A content addressed BTree☆34Updated 6 years ago
- Towards an IETF RFC for XChaCha20-Poly1305☆28Updated 5 years ago