c2pa-org / public-draftLinks
Repository for the public drafts of the C2PA Specifications
☆37Updated 3 years ago
Alternatives and similar repositories for public-draft
Users that are interested in public-draft are comparing it to the libraries listed below
Sorting:
- The public specifications for the C2PA☆152Updated 2 months ago
- C2PA Website☆21Updated 2 months ago
- Source Code Transparency☆11Updated last year
- Command line tool for displaying and adding C2PA manifests☆121Updated 8 months ago
- ☆26Updated last week
- Coordination of implementation and interop specific details☆122Updated 4 months ago
- OpenSSF Project Template☆20Updated last year
- Rust source code for the FrodoPIR Private Information Retrieval scheme.☆67Updated last year
- A dead man's switch for full but responsible disclosure of vulnerabilities☆56Updated 10 months ago
- Experimental implementation of the Distributed Aggregation Protocol (DAP) specification.☆63Updated last week
- An Architecture for Trustworthy Digital Supply Chain Transparency Services☆13Updated this week
- This document describes the Distributed Aggregation Protocol (DAP) being developed by the PPM working group at IETF.☆50Updated this week
- Privacy Pass implementation in Rust☆44Updated 2 months ago
- OPAQUE protocol, a secure asymmetric password authenticated key exchange (aPAKE) that supports mutual authentication in a client-server s…☆80Updated 4 years ago
- A guide on coordinated vulnerability disclosure for open source projects. Includes templates for security policies (security.md) and disc…☆137Updated last year
- Sandwich is a multi-platform, multi-language, open-source library that provides a simple unified API for developers to use (multiple) cry…☆119Updated 2 months ago
- A variant of a Fuzzy Vault cryptographic scheme designed for encrypting data with better human recovery features.☆50Updated 4 years ago
- A library for building efficient set-membership filters and dictionaries based on the Satisfiability problem.☆82Updated 3 years ago
- Digital Credentials API☆132Updated this week
- W3C Verifiable Credentials v2.0 Specification☆333Updated 3 months ago
- A Python implementation of Garbled Circuits MPC protocol☆61Updated last year
- A permissively licensed, low-level, high-performance cryptographic hash library for hackers.☆27Updated 3 months ago
- KERI Community Development Efforts Meetings Discussion☆63Updated 3 weeks ago
- Implementation of Messaging Layer Security☆128Updated 2 months ago
- Decentralized Identifier Use Cases and Requirements v1.0☆55Updated 6 months ago
- ☆107Updated last week
- Reference implementation of the Picnic post-quantum signature scheme☆165Updated 2 years ago
- Mirror of a website on Elligator by Daniel J. Bernstein, Mike Hamburg, Anna Krasnova, and Tanja Lange☆17Updated 5 months ago
- An implementation of an auditable key directory☆282Updated last week
- Specifications for Privacy Proxy Implementations☆31Updated this week