bifurcation / treekeysLinks
Group Keying via Trees
☆12Updated 8 years ago
Alternatives and similar repositories for treekeys
Users that are interested in treekeys are comparing it to the libraries listed below
Sorting:
- An EXPERIMENTAL Go implementation of the CPace PAKE, instantiated with the ristretto255 group.☆29Updated 4 years ago
- EME (Encrypt-Mix-Encrypt) wide-block encryption for Go.☆51Updated last week
- Extensions and experiments.☆65Updated 2 years ago
- User-space deniable data encryption client.☆94Updated 2 years ago
- Use roughtime as a trusted timestamp agent☆35Updated last year
- Go implementation of libhydrogen - a lightweight, easy-to-use crypto library☆24Updated 8 years ago
- A distributed hash table with unusually strong security properties☆65Updated 6 years ago
- oht is an onion routed (using the Tor network, similar in design to ricochet and onionshare) distributed hash table to be used as the bas…☆46Updated 7 years ago
- An implementation of Noise in Go☆44Updated 7 years ago
- A pure Go implementation of security question style password recovery that preserves end-to-end cryptographic security.☆29Updated 11 years ago
- A pure-go implementation of the Axolotl Ratchet, extracted from pond☆21Updated 8 years ago
- orc - Onion router control protocol library.☆40Updated 8 years ago
- Go implementation of OpenBSD's signify(1)☆21Updated 5 years ago
- Go implementation of OPAQUE (hidden password user registration and auth)☆58Updated 5 years ago
- Transmit large files over lossy networks using Raptor fountain codes☆64Updated 6 years ago
- Rust implementation of CryptoURI: URN-like namespace for cryptographic objects with Bech32-based encoding☆37Updated 2 years ago
- AGL/Golang Standard Library Ed25519 including extra25519 code.☆16Updated 5 years ago
- Your internet-wide general-purpose DHT to store key/value pairs☆124Updated 7 years ago
- Bootstrapping secure communication without leaking metadata☆77Updated 6 years ago
- Libraries and binaries for running witnesses for verifiable logs☆35Updated this week
- A net.Listener implementation leveraging Unix domain socket features to reliably identify client processes.☆16Updated 6 years ago
- bulb is not stem☆31Updated 8 years ago
- maximum performance data processing☆34Updated 7 months ago
- High assurance Go secp256k1 (Mirror)☆27Updated 2 years ago
- SPHINCS-256 practical stateless hash-based signature scheme☆26Updated 9 years ago
- Implementation of libsodium's secretstream in Go☆20Updated 2 weeks ago
- Post-quantum file and stream encryption☆31Updated 2 months ago
- Supersingular Isogeny Diffie-Hellman in Go☆138Updated 6 years ago
- A golang implementation of Ed448-Goldilocks. This is a mirror of https://bugs.otr.im/otrv4/ed448☆41Updated 2 years ago
- salty privacy☆52Updated 5 years ago