coniks-sys / coniks-goView external linksLinks
A CONIKS implementation in Golang
☆118Oct 6, 2022Updated 3 years ago
Alternatives and similar repositories for coniks-go
Users that are interested in coniks-go are comparing it to the libraries listed below
Sorting:
- CONIKS design documents☆16Nov 14, 2016Updated 9 years ago
- a VRF implementation following this ietf draft: https://tools.ietf.org/html/draft-goldbe-vrf-00☆21Jul 16, 2018Updated 7 years ago
- A CONIKS implementation in Java☆60Oct 12, 2018Updated 7 years ago
- Sample implementation of NSEC5 cryptography☆23Aug 27, 2018Updated 7 years ago
- An experimental cooperative keyserver based on ideas from dename.☆107Jul 7, 2017Updated 8 years ago
- A transparent and secure way to look up public keys.☆1,573Jul 5, 2021Updated 4 years ago
- Go package to connect to Ledger devices☆19Aug 22, 2025Updated 5 months ago
- A privacy-preserving digital version of punch cards used in store loyalty programs☆11Apr 19, 2021Updated 4 years ago
- The monorepo for Meson project☆11May 30, 2024Updated last year
- Hackathon project for Snarky workshop.☆11Jun 21, 2019Updated 6 years ago
- Pastry DHT implementation with a standalone libp2p compatible node☆12Jun 22, 2020Updated 5 years ago
- Hybrid Public Key Encryption☆51Jul 10, 2024Updated last year
- A golang implementation of a sparse merkle tree☆56Dec 27, 2018Updated 7 years ago
- An EXPERIMENTAL implementation of the CPace PAKE, instantiated with the Ristretto255 group. In Rust☆17Aug 25, 2020Updated 5 years ago
- Ed25519 peculiarities - now in your browser☆11Feb 6, 2025Updated last year
- Oblivious Pseudorandom Functions (OPRFs) using Prime-Order Groups☆38Sep 10, 2024Updated last year
- Fully-compatible implementation of Privacy Pass in Rust.☆35Apr 20, 2020Updated 5 years ago
- oZKS (Ordered Zero-Knowledge Set) is a library that provides an implementation of an Ordered (and Append Only) Zero-Knowledge Set.☆28Oct 10, 2025Updated 4 months ago
- basic code for verifiable random function and simple cryptographic sortition☆53Aug 14, 2021Updated 4 years ago
- js-ctypes wrapper for libotr☆29Oct 16, 2017Updated 8 years ago
- 🦀 Rust implementation of sinkhole private information retrieval☆16Apr 16, 2021Updated 4 years ago
- Omnet Simulator for Spider - Routing algorithms for Cryptocurrencies☆15Apr 4, 2021Updated 4 years ago
- OPAQUE asymmetric PAKE, and its threshold implementation. Experimental, not audited.☆17Jun 16, 2021Updated 4 years ago
- a web page / paper☆18Feb 24, 2017Updated 8 years ago
- Malicious Two Party Computation Based on Garbled Circuits.☆12Sep 5, 2020Updated 5 years ago
- EN.601.741: Advanced Topics in Secure and Censorship-Resistant Communications☆15Jan 25, 2021Updated 5 years ago
- Specifications for Privacy Proxy Implementations☆32Feb 8, 2026Updated last week
- Go Language dns seeder for Bitcoin based networks☆27Jul 14, 2022Updated 3 years ago
- implements invertible bloom filters in golang☆17Feb 3, 2020Updated 6 years ago
- The anonymous credentials zoo☆16Mar 17, 2021Updated 4 years ago
- ☆58Mar 6, 2017Updated 8 years ago
- Advanced crypto library for the Go language☆689Updated this week
- Collection of radicle binaries.☆20Oct 5, 2021Updated 4 years ago
- Stronger and Faster Side-Channel Protections for CSIDH☆20Dec 20, 2020Updated 5 years ago
- An alternative full node bitcoin implementation written in Go (golang)☆20Jan 24, 2022Updated 4 years ago
- Implementation of draft-irtf-cfrg-hpke☆30May 11, 2023Updated 2 years ago
- Golang ed25519☆47May 5, 2021Updated 4 years ago
- Verification-Driven Development☆21Mar 26, 2021Updated 4 years ago
- Implementations of a fast Elliptic-curve Diffie-Hellman primitive☆27Apr 13, 2015Updated 10 years ago