chris-wood / odoh-serverView external linksLinks
(Oblivious) DoH Server
☆26Feb 21, 2022Updated 3 years ago
Alternatives and similar repositories for odoh-server
Users that are interested in odoh-server are comparing it to the libraries listed below
Sorting:
- Docker image: DNS over HTTPS proxy☆11Jun 26, 2020Updated 5 years ago
- An Internet-Draft for the Balloon Key Derivation Function (BKDF), a memory-hard password hashing and password-based key derivation functi…☆11Jun 29, 2025Updated 7 months ago
- A tool for linear and differential cryptanalysis of block ciphers written in Rust☆15Sep 28, 2022Updated 3 years ago
- Entity Attestation Token IETF Draft Standard☆20Apr 15, 2025Updated 10 months ago
- I-D that describes the algorithm identifiers for NIST's PQC ML-DSA for use in the Internet X.509 Public Key Infrastructure☆14Oct 30, 2025Updated 3 months ago
- Hey, Elon Chrome Extension☆12Nov 9, 2022Updated 3 years ago
- Optimized implementation of ring-TESLA☆11Aug 4, 2016Updated 9 years ago
- Tamarin proof for the KEMTLS protocol using the multi-stage AKE model☆13Apr 19, 2023Updated 2 years ago
- ☆13Feb 21, 2021Updated 4 years ago
- Circuits for functions of interest to cryptography☆28Jan 31, 2024Updated 2 years ago
- ☆12Mar 1, 2023Updated 2 years ago
- Solution to harden TLS security by storing private keys and delegating operations to the Trused Execution Environment☆13Oct 10, 2022Updated 3 years ago
- A Mastodon bot that posts a list of new .gov registrations each day☆12Feb 13, 2023Updated 3 years ago
- Bottom-up memory-safety for assembly language using symbolic execution☆17Updated this week
- Standalone implemention of authenticated encryption algorithms☆12Jan 28, 2022Updated 4 years ago
- #️⃣ 🕸️ 👤 HTTP Headers Hashing☆13Aug 27, 2023Updated 2 years ago
- Banquet implementation☆14May 6, 2022Updated 3 years ago
- Constant-time choose between two variables in Clang/LLVM☆20Apr 14, 2018Updated 7 years ago
- GPU code for the first SHA-1 collision attack and two freestart attacks☆14Jun 22, 2020Updated 5 years ago
- App for controlling the DNSCrypt Proxy on Android☆12Dec 28, 2017Updated 8 years ago
- ☆34Jul 9, 2020Updated 5 years ago
- Tornado is a compiler producing masked bitsliced implementations proven secure in the bit/register probing model☆18Mar 14, 2021Updated 4 years ago
- Mirror of my Go Kyber implementation.☆16May 30, 2018Updated 7 years ago
- Rust native library for TPM 2.0 operations. Heavily work in progress.☆13Dec 5, 2022Updated 3 years ago
- Experimental implementation of KEMTLS in Rustls☆34Nov 11, 2025Updated 3 months ago
- A powerful and easy to use cross-platform website static generator☆13Jul 25, 2023Updated 2 years ago
- Reference implementation of the BLZZRD variant of the BLISS Ring-LWE Signature Scheme☆17Oct 11, 2016Updated 9 years ago
- Implementation of libsodium's secretstream in Go☆20Updated this week
- An implementation of the IETF QUIC protocol in F*☆20Aug 8, 2019Updated 6 years ago
- ☆17Feb 21, 2022Updated 3 years ago
- Wycheproof for Rust☆20Sep 3, 2025Updated 5 months ago
- This is only the beginning.☆19Updated this week
- dnscrypt - authenticated and encrypted dns client for nodejs☆14Sep 26, 2020Updated 5 years ago
- Faster Montgomery and Joye ladder formulas for short Weierstrass elliptic curves☆22Jul 1, 2020Updated 5 years ago
- like ChaCha, but 64-bit instead of 32-bit thanks to BLAKE2b's permutation☆16Apr 8, 2017Updated 8 years ago
- Reference implementations of post-quantum cryptographic primitives☆33Aug 27, 2025Updated 5 months ago
- Frayed ribbon filter cascade☆49Mar 30, 2023Updated 2 years ago
- High-order countermeasures for AES and DES☆24Aug 1, 2024Updated last year
- A simple python script used to generate bit flipped versions of domain names☆23Mar 12, 2021Updated 4 years ago