cose-wg / COSE-C
Implementation of COSE in C++; Provides a C interface; Crypto by openssl or mbedtls
☆30Updated last year
Alternatives and similar repositories for COSE-C:
Users that are interested in COSE-C are comparing it to the libraries listed below
- A constrained node implementation of CBOR in C☆108Updated 5 years ago
- Constrained node COSE library☆23Updated 2 years ago
- Commercial quality COSE_Sign1 implementation in C for constrained environment. Works with MbtedTLS and OpenSSL Crypto.☆28Updated last month
- Eclipse tinydtls☆112Updated 2 months ago
- ☆18Updated 2 years ago
- CoAP Implementation in C☆129Updated last year
- Userspace tools for Linux IEEE 802.15.4 stack☆54Updated 3 months ago
- CBOR protocol implementation for C☆358Updated last week
- PKCS#11 Test Suite☆79Updated last year
- 6LBR copy of TinyDTLS, see official repository for support outside 6LBR☆27Updated 8 years ago
- unstrung is an IETF roll - RPL (ripple) implementation for Linux☆29Updated 2 weeks ago
- RPL for {Linux, LWIP, Embedded OS}. A mesh routing protocol implementation designed to scale, yet resource optimal. Primary factor for op…☆14Updated 3 years ago
- CBOR library aimed at heavily constrained devices☆50Updated 9 months ago
- Algorithm for calculating exponential backoff with jitter for network retry attempts.☆31Updated 4 months ago
- ☆12Updated last month
- ☆100Updated 9 months ago
- DEPRECATED: Use https://github.com/MicrochipTech/cryptoauthlib/wiki/PKCS11-Linux-Setup☆78Updated 6 years ago
- Comprehensive, powerful, commercial-quality CBOR encoder/ decoder that is still suited for small devices.☆198Updated last month
- A constrained node implementation of CBOR in C☆68Updated 3 years ago
- Yet another RPL implementation for Linux☆10Updated 2 years ago
- Documentation source and development of the PSA Certified API☆64Updated 2 weeks ago
- Python wrapper for wolfSSL embedded SSL/TLS library.☆39Updated 5 months ago
- Concise Binary Object Representation (CBOR) Library☆530Updated last week
- HSM library that uses wolfCrypt as it's fallback crypto☆16Updated last week
- A cheatsheet for the Constrained Application Protocol (CoAP).☆55Updated 6 years ago
- A collection of cryptographic primitives targeted at embedded use.☆341Updated last year
- SHA-3 implementation for 8-bit AVR☆9Updated 6 years ago
- wolfTPM is a highly portable TPM 2.0 library, designed for embedded use.☆264Updated 2 weeks ago
- Plug & Trust middleware to use secure element SE050☆38Updated 3 weeks ago
- OSCORE and EDHOC libraries for or constrained (and non-constrained) devices. See https://arxiv.org/pdf/2103.13832.pdf for more background…☆16Updated 3 years ago