A CONIKS implementation in Java
☆60Oct 12, 2018Updated 7 years ago
Alternatives and similar repositories for coniks-java
Users that are interested in coniks-java are comparing it to the libraries listed below
Sorting:
- js-ctypes wrapper for libotr☆29Oct 16, 2017Updated 8 years ago
- Keyname format for public-key fingerprints☆22Jun 4, 2014Updated 11 years ago
- Specification to describe the minimum information standard for online community data. Guidelines for describing data about online communi…☆11Sep 19, 2016Updated 9 years ago
- Web interface to IntelMQ☆10Sep 10, 2025Updated 5 months ago
- CoSi command line interface☆21Jan 23, 2017Updated 9 years ago
- The Matasano Crypto Challenges in Rust http://cryptopals.com/☆11Nov 5, 2015Updated 10 years ago
- Do miniLock encryption operations on a web page of your own.☆11Mar 21, 2016Updated 9 years ago
- Watching the FISA Court's public docket.☆43Dec 19, 2014Updated 11 years ago
- An experimental cooperative keyserver based on ideas from dename.☆107Jul 7, 2017Updated 8 years ago
- The repo of rust crate 'releasetag'. Releasetags can be extracted from application crash-files postmortem☆13May 1, 2019Updated 6 years ago
- ☆13Sep 3, 2019Updated 6 years ago
- reading lists☆32Jan 29, 2019Updated 7 years ago
- wordpress as a sandstorm app☆13Dec 28, 2023Updated 2 years ago
- A research-only integration of Sovereign with Celestia☆20May 30, 2023Updated 2 years ago
- Docker environment that contains a Database, Monitor, Observatory and Analyzer☆14Sep 29, 2021Updated 4 years ago
- ☆14Jul 9, 2015Updated 10 years ago
- Website for Modern PGP☆14Mar 15, 2018Updated 7 years ago
- ☆19Mar 28, 2017Updated 8 years ago
- Provision Machines Via SSH or WinRM Using Chef Provisioning☆15Oct 14, 2019Updated 6 years ago
- Package for implementing clients and servers of the 9P and 9P2000 distributed resource protocols in Go.☆19Jan 26, 2016Updated 10 years ago
- A JavaScript implementation of axolotl. Axolotl is a ratcheting forward secrecy protocol.☆75Feb 1, 2016Updated 10 years ago
- Applet for testing ecc curves☆25Mar 20, 2019Updated 6 years ago
- Zipper data structure for python. Described by Huet, ported from clojure.☆24Nov 22, 2023Updated 2 years ago
- A keychain library for managing private + public keys☆19Feb 10, 2017Updated 9 years ago
- CPGB is the Curve Privacy Guard B, a secure replacement for GPG using ECC.☆25Dec 20, 2011Updated 14 years ago
- https://noncombatant.org/2014/03/11/privacy-and-security-settings-in-chrome/☆17Oct 22, 2015Updated 10 years ago
- Cryptographic signatures for auditing unsafe code in Rust☆55Jan 19, 2015Updated 11 years ago
- a C++ template library for zero knowledge proofs☆49Dec 8, 2015Updated 10 years ago
- A python implementation of the Axolotl ratchet protocol.☆71Sep 16, 2017Updated 8 years ago
- Delicious Onion Service Wraps.☆23May 7, 2015Updated 10 years ago
- Coded Merkle Tree☆25Aug 6, 2019Updated 6 years ago
- secure messaging, file-transfer, and directory synchronization☆41Jul 20, 2017Updated 8 years ago
- Secure Internet Live Conferencing☆68Jul 2, 2017Updated 8 years ago
- Macaroons: bearer credentials with caveats for distributed authorization☆61Feb 10, 2017Updated 9 years ago
- a C++ embedded domain specific language for zero knowledge proofs☆59Dec 9, 2016Updated 9 years ago
- Tendermint consensus in Rust☆26Jun 24, 2022Updated 3 years ago
- Plasma Winter - an account model Plasma with with zkSNARK proved state transitions. Started on ETH Singapore☆30Dec 21, 2018Updated 7 years ago
- Use OpenPGP-based encryption in Yahoo mail.☆222Oct 14, 2016Updated 9 years ago
- ☆58Mar 6, 2017Updated 8 years ago