chris-wood / odoh-server
(Oblivious) DoH Server
☆26Updated 3 years ago
Alternatives and similar repositories for odoh-server
Users that are interested in odoh-server are comparing it to the libraries listed below
Sorting:
- A docker image to host one's DNS-over-HTTPS proxy☆28Updated 5 years ago
- Deterministic/nonce-reuse resistant authenticated encryption scheme using XChaCha20, implemented on libsodium.☆29Updated 9 months ago
- ☆18Updated last year
- Specifications for Privacy Proxy Implementations☆30Updated 2 weeks ago
- Oblivious DoH library☆17Updated 3 years ago
- tamper resistant audit log☆18Updated 6 years ago
- A simple tool to fetch and filter domain blacklists for use with tools like https://github.com/DNSCrypt/dnscrypt-proxy☆23Updated 2 years ago
- Python implementation of the Sphinx mix format. - Paper: http://www.cypherpunks.ca/~iang/pubs/Sphinx_Oakland09.pdf☆15Updated 5 years ago
- System tuning recommendations for running cryptographic applications☆23Updated 8 years ago
- Entity Attestation Token IETF Draft Standard☆18Updated 3 weeks ago
- Pong revolution.☆13Updated 5 years ago
- Blind RSA signatures for OpenSSL/BoringSSL.☆17Updated last year
- Docker image: DNS over HTTPS proxy☆11Updated 4 years ago
- ☆24Updated 7 months ago
- A golang implementation of Ed448-Goldilocks. This is a mirror of https://bugs.otr.im/otrv4/ed448☆40Updated 2 years ago
- Argon2 key derivation function in zig.☆15Updated 3 years ago
- Naehrig, Niederhagen and Schwabe's pairings code, massaged into a shared library.☆16Updated 9 years ago
- Internet-Draft on IP address privacy☆16Updated last month
- ipcipher is a specification for encrypting IP{v4,v6} addresses 'in place'.☆20Updated 7 years ago
- Generic anonymous routing protocol framework agnostic to encryption algorithm and transport layer☆15Updated 6 years ago
- A design for doing more private Signal groups using anonymous credentials based on algebraic MACs.☆14Updated 5 years ago
- XChaCha8Blake3Siv is a nonce-reuse misuse-resistant (NRMR) and key-committing authenticated encryption with associated data (AEAD) algori…☆17Updated 3 years ago
- Towards an IETF RFC for XChaCha20-Poly1305☆28Updated 5 years ago
- Auditing Applied Cryptography☆10Updated 5 years ago
- Reference implementations of post-quantum cryptographic primitives☆29Updated last year
- Implementation and simulations for the "Reducing Metadata Leakage from Encrypted Data and Communication with PURBs" paper☆30Updated last year
- Like Tor2Web, but not just HTTP ( using IPv6 )☆126Updated 4 years ago
- Differential fuzzing for elliptic curves☆23Updated last year
- A tiny DNS server that returns the client (resolver) IP☆27Updated 4 months ago
- ☆9Updated 2 years ago