bifurcation / treekeys
Group Keying via Trees
☆12Updated 7 years ago
Alternatives and similar repositories for treekeys:
Users that are interested in treekeys are comparing it to the libraries listed below
- A pure Go implementation of security question style password recovery that preserves end-to-end cryptographic security.☆28Updated 10 years ago
- An EXPERIMENTAL Go implementation of the CPace PAKE, instantiated with the ristretto255 group.☆29Updated 4 years ago
- Use roughtime as a trusted timestamp agent☆34Updated 11 months ago
- Shamir's Secret Sharing Algorithm implementation in golang combined with PGP and a mail delivery system☆35Updated 7 years ago
- User-space deniable data encryption client.☆94Updated last year
- gosignify is a Go reimplementation of OpenBSD's signify☆17Updated last year
- A golang implementation of the Haraka v2 family of hash functions☆14Updated 6 years ago
- Go implementation of libhydrogen - a lightweight, easy-to-use crypto library☆24Updated 7 years ago
- Traffic analysis resistant messaging with Qt based user interface☆30Updated last year
- Stupid crypto tricks☆18Updated 3 years ago
- Detect malicious homoglyphs in Go source code☆46Updated 7 years ago
- Nearly generic prime field implementation in Go☆24Updated 5 years ago
- Go PASETO implementation☆19Updated 4 years ago
- Go port of secret-handshake☆44Updated 2 months ago
- A library that provides simple TLS SNI demultiplexing without actually consuming the SSL handshake.☆23Updated 9 years ago
- [mirror] Use U2F for PAM remotely☆10Updated 4 years ago
- A native bcrypt library for go (golang)☆12Updated 3 years ago
- GoZFS is a pure-Go implementation of ZFS userspace☆25Updated 2 years ago
- golang port of Gimli, https://gimli.cr.yp.to, a 384-bit permutation designed to achieve high security with high performance across a broa…☆17Updated 6 years ago
- `age-plugin-yubikey` implementation, encrypt things with a Yubikey/any PIV card☆25Updated 4 years ago
- Derive Curve25519 encryption keys and ed25519 signing keys from username and password via BLAKE2s hash and scrypt.☆20Updated 8 years ago
- Go package providing efficient time management primitives.☆18Updated last year
- Package tcpopt implements encoding and decoding of TCP-level socket options☆12Updated 5 years ago
- Delicious Onion Service Wraps.☆23Updated 9 years ago
- A warrant canary system☆30Updated 6 years ago
- A net.Listener implementation leveraging Unix domain socket features to reliably identify client processes.☆16Updated 5 years ago
- Run Fastly Compute@Edge Wasm programs on your own computer, powered by wasmtime☆37Updated 3 years ago
- NAT probing toolkit.☆22Updated 5 years ago
- @FuzzyMonkeyCo's minion☆20Updated 3 weeks ago