chris-wood / odohLinks
Oblivious DoH library
☆17Updated 3 years ago
Alternatives and similar repositories for odoh
Users that are interested in odoh are comparing it to the libraries listed below
Sorting:
- ☆47Updated 11 months ago
- Oblivious HTTP implementation☆31Updated last year
- A secure clock-synchronization protocol for when rough is enough.☆161Updated 9 months ago
- Oblivious DoH library in Go☆145Updated last year
- Implementation of draft-irtf-cfrg-hpke☆30Updated 2 years ago
- Constant time big numbers for Go☆104Updated 6 months ago
- NIST P elliptic curves (re-exported from crypto/internal/nistec)☆49Updated 2 years ago
- Implementations of do255e and do255s in C and assembly☆25Updated 4 years ago
- Specifications for Privacy Proxy Implementations☆31Updated last week
- Message Layer Security☆54Updated 4 years ago
- ☆25Updated 4 months ago
- Implementation of do255e and do255s in Go☆23Updated 4 years ago
- Elliptic Curve Cryptography Compiler: an incomplete experiment in code-generation for elliptic curves in Go☆55Updated 4 years ago
- Deterministic/nonce-reuse resistant authenticated encryption scheme using XChaCha20, implemented on libsodium.☆30Updated last year
- Oblivious DoH server in Go☆66Updated 3 years ago
- A golang implementation of Ed448-Goldilocks. This is a mirror of https://bugs.otr.im/otrv4/ed448☆40Updated 2 years ago
- An EXPERIMENTAL Go implementation of the CPace PAKE, instantiated with the ristretto255 group.☆29Updated 4 years ago
- A collection of high-performance crypto implementations.☆52Updated 4 months ago
- Noise Protocol Framework (Mirror)☆53Updated 3 months ago
- A small and easy to use HPKE implementation in Go.☆20Updated 9 months ago
- Generate and verify JWT tokens with Trusted Platform Module (TPM)☆13Updated 3 weeks ago
- Bertie TLS 1.3 Implementation☆125Updated 3 months ago
- Entity Attestation Token IETF Draft Standard☆19Updated 5 months ago
- A Zig implementation of EdDSA signatures with blind keys.☆17Updated 2 years ago
- The BLAKE3 paper: specifications, analysis, and design rationale☆180Updated 3 years ago
- Community Cryptography Test Vectors☆84Updated 4 months ago
- Coordination of implementation and interop specific details☆122Updated 4 months ago
- ☆24Updated 11 months ago
- Fork of BoringSSL that adds hybrid post-quantum key exchange☆24Updated 11 months ago
- ☆21Updated 2 months ago