WARNING: Deprecated! See Privacy Pass
☆99Jan 5, 2017Updated 9 years ago
Alternatives and similar repositories for challenge-bypass-specification
Users that are interested in challenge-bypass-specification are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Keyname format for public-key fingerprints☆22Jun 4, 2014Updated 11 years ago
- proposal for blinded-token captchas☆26Jul 19, 2016Updated 9 years ago
- Package fourq implements FourQ, a high-speed elliptic curve at the 128-bit security level.☆54Oct 14, 2024Updated last year
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆28Apr 20, 2018Updated 7 years ago
- Privacy-preserving Tor statistics aggregation tool that implements the secret-sharing variant of the PrivEx algorithm.☆27Sep 21, 2020Updated 5 years ago
- OPAQUE asymmetric PAKE, and its threshold implementation. Experimental, not audited.☆17Jun 16, 2021Updated 4 years ago
- Public working documents (e.g., Internet drafts)☆26Jun 8, 2018Updated 7 years ago
- Implementation of cryptographic primitives in Go☆13Mar 13, 2023Updated 3 years ago
- PKCS#7 Padding for Go☆11Apr 24, 2020Updated 5 years ago
- ☆29Jul 29, 2014Updated 11 years ago
- A Minimal TLS 1.3 Implementation in Go☆228Dec 18, 2023Updated 2 years ago
- An experimental cooperative keyserver based on ideas from dename.☆107Jul 7, 2017Updated 8 years ago
- An implementation of the axolotl ratchet based on libsodium.☆23Oct 4, 2022Updated 3 years ago
- ☆58Mar 6, 2017Updated 9 years ago
- List of crypto projects that might not suck☆423Jan 17, 2023Updated 3 years ago
- [RFC9380] Hash to curves - Rust reference implementation☆27Mar 10, 2024Updated 2 years ago
- A set of scripts to root and install gapps and orbot+orwall into a CopperheadOS image and re-sign it for verified boot.☆225Oct 15, 2017Updated 8 years ago
- misc stuff☆19Jun 1, 2017Updated 8 years ago
- Experimental High Assurance Cryptographic Library☆20Feb 1, 2016Updated 10 years ago
- Simple script for PGP encrypted newsletter☆26Feb 13, 2016Updated 10 years ago
- The anonymous credentials zoo☆16Mar 17, 2021Updated 5 years ago
- Secure multiparty messaging (kindof)☆21Jun 2, 2016Updated 9 years ago
- Simple OS keychain bindings for password storage in Go (Golang)☆25May 16, 2017Updated 8 years ago
- An RFC5297-compliant C implementation of AES-SIV☆20Oct 15, 2020Updated 5 years ago
- Protected E-mail Headers☆73Feb 7, 2020Updated 6 years ago
- Table cat☆21Feb 21, 2018Updated 8 years ago
- CONIKS design documents☆16Nov 14, 2016Updated 9 years ago
- ipcrypt implementation in C☆33Apr 18, 2025Updated 11 months ago
- OZ: a sandboxing system targeting everyday workstation applications☆440Apr 18, 2018Updated 7 years ago
- Jump to Full Encryption☆61Oct 29, 2016Updated 9 years ago
- Models for authenticated key exchange in Tamarin☆12Oct 9, 2019Updated 6 years ago
- Implements ristretto255, a fast prime-order group.☆110Feb 19, 2026Updated last month
- The Matasano Crypto Challenges in Rust http://cryptopals.com/☆11Nov 5, 2015Updated 10 years ago
- Implementation of libsodium's secretstream in Go☆21Mar 17, 2026Updated last week
- Signed list of OpenPGP fingerprints for First Look employees☆15Feb 3, 2025Updated last year
- Small program to read lists of Tor exit nodes and draw picture showing when they join/leave list☆29Feb 26, 2016Updated 10 years ago
- ☆18Nov 14, 2018Updated 7 years ago
- PoC of Swift for Compute@Edge☆12Feb 3, 2022Updated 4 years ago
- Meta-repository for Miscreant: misuse-resistant symmetric encryption library with AES-SIV (RFC 5297) and AES-PMAC-SIV support☆475Sep 3, 2019Updated 6 years ago