c2pa-org / public-draftLinks
Repository for the public drafts of the C2PA Specifications
☆37Updated 3 years ago
Alternatives and similar repositories for public-draft
Users that are interested in public-draft are comparing it to the libraries listed below
Sorting:
- ☆27Updated this week
- Coordination of implementation and interop specific details☆122Updated 6 months ago
- A library for building efficient set-membership filters and dictionaries based on the Satisfiability problem.☆80Updated 3 years ago
- Making transparency normal!☆24Updated last year
- This document describes the Distributed Aggregation Protocol (DAP) being developed by the PPM working group at IETF.☆50Updated last week
- SDK for private data access, built on homomorphic encryption.☆353Updated last year
- Maat is a centralized software integrity measurement and attestation (M&A) service☆31Updated 11 months ago
- Source Code Transparency☆11Updated 2 years ago
- VDAF specification☆23Updated this week
- RLBox sandboxing framework☆312Updated last month
- Library sandboxing for the Verona research language and usable in other contexts.☆46Updated 2 years ago
- An implementation of an auditable key directory☆287Updated last month
- Python implementation of C2PA: Coalition for Content Provenance and Authenticity.☆39Updated 3 years ago
- Specifications for Privacy Proxy Implementations☆31Updated last week
- The public release of LeftoverLocals code☆70Updated last year
- A raw implementation of Interoperable Private Attribution☆45Updated 4 months ago
- ☆109Updated this week
- GoFetch: Breaking Constant-Time Cryptographic Implementations Using Data Memory-Dependent Prefetchers -- USENIX Security'24☆268Updated last year
- An Architecture for Trustworthy Digital Supply Chain Transparency Services☆15Updated this week
- Main repository for the Veracruz privacy-preserving compute project, an adopted project of the Confidential Compute Consortium (CCC).☆198Updated 6 months ago
- OpenSSF Project Template☆20Updated last year
- A Fully Homomorphic Encryption Brainfuck virtual machine☆216Updated 5 years ago
- ☆32Updated last year
- Test tool for CTAP2 authenticators☆56Updated 2 years ago
- Supply Chain Integrity Transparency and Trust ledger application using Confidential Consortium Framework (CCF)☆39Updated this week
- ☆129Updated 2 years ago
- ☆10Updated last month
- problem sets for CS-GY 6903 Applied Cryptography☆41Updated 3 years ago
- ☆451Updated 3 years ago
- Assured confidential execution (ACE) implements VM-based trusted execution environment (TEE) for embedded RISC-V systems with focus on a …☆190Updated this week