chris-wood / odohLinks
Oblivious DoH library
☆17Updated 3 years ago
Alternatives and similar repositories for odoh
Users that are interested in odoh are comparing it to the libraries listed below
Sorting:
- Oblivious HTTP implementation☆31Updated last year
- A secure clock-synchronization protocol for when rough is enough.☆157Updated 7 months ago
- ☆47Updated 10 months ago
- Deterministic/nonce-reuse resistant authenticated encryption scheme using XChaCha20, implemented on libsodium.☆30Updated 11 months ago
- Implementations of do255e and do255s in C and assembly☆25Updated 4 years ago
- Constant time big numbers for Go☆103Updated 5 months ago
- Specifications for Privacy Proxy Implementations☆31Updated this week
- Oblivious DoH server in Go☆66Updated 3 years ago
- Oblivious DoH library in Go☆143Updated last year
- Implementation of draft-irtf-cfrg-hpke☆30Updated 2 years ago
- NIST P elliptic curves (re-exported from crypto/internal/nistec)☆48Updated last year
- A golang implementation of Ed448-Goldilocks. This is a mirror of https://bugs.otr.im/otrv4/ed448☆40Updated 2 years ago
- Message Layer Security☆54Updated 4 years ago
- Xoodyak, a lightweight and versatile cryptographic scheme implemented in Rust.☆30Updated 3 months ago
- Entity Attestation Token IETF Draft Standard☆19Updated 3 months ago
- An EXPERIMENTAL Go implementation of the CPace PAKE, instantiated with the ristretto255 group.☆29Updated 4 years ago
- ☆24Updated 2 months ago
- A collection of high-performance crypto implementations.☆53Updated 3 months ago
- ☆28Updated 3 years ago
- Make AES-GCM safe to use with random nonces, for any practical number of messages.☆18Updated last year
- Implementation of https://www.ietf.org/archive/id/draft-denis-aegis-aead-00.html / https://competitions.cr.yp.to/round3/aegisv11.pdf☆13Updated 4 months ago
- Compress sets of integers efficiently☆22Updated 3 months ago
- WebPKI-level Certificate Revocation via Multi-Level Bloom Filter Cascade☆114Updated this week
- A Zig implementation of EdDSA signatures with blind keys.☆17Updated 2 years ago
- Generate and verify JWT tokens with Trusted Platform Module (TPM)☆13Updated last week
- Supersingular Isogeny Diffie-Hellman in Go☆136Updated 5 years ago
- Implementation of do255e and do255s in Go☆23Updated 4 years ago
- The BLAKE3 paper: specifications, analysis, and design rationale☆180Updated 3 years ago
- Bertie TLS 1.3 Implementation☆124Updated 2 months ago
- Elliptic Curve Cryptography Compiler: an incomplete experiment in code-generation for elliptic curves in Go☆55Updated 4 years ago