cossacklabs / hermes-coreLinks
Security framework for building multi-user end-to-end encrypted data storage and sharing/processing with zero leakage risks from storage and transport infrastructure.
☆86Updated 4 years ago
Alternatives and similar repositories for hermes-core
Users that are interested in hermes-core are comparing it to the libraries listed below
Sorting:
- A signed hash chain implementation for zero-trust data management.☆48Updated 7 years ago
- Sphinx-based Password Storage low-level library☆129Updated last year
- PriFi, a low-latency, local-area anonymous communication network.☆51Updated 2 years ago
- Coordination of implementation and interop specific details☆127Updated 2 weeks ago
- Signature scheme submitted to NIST's Post-Quantum Cryptography Project☆74Updated 8 years ago
- cgo wrappers around post-quantum cryptography primitives☆23Updated 7 years ago
- Wiki for Noise development☆81Updated 9 years ago
- Overlay Network for distributed protocols☆51Updated 2 years ago
- A decentralized privacy-preserving data sharing tool☆31Updated 4 years ago
- Go library of Teserakt's E4 end-to-end security protocol☆22Updated 5 years ago
- ☆43Updated 4 years ago
- A memory-hard password hashing function.☆71Updated 2 years ago
- OPAQUE protocol, a secure asymmetric password authenticated key exchange (aPAKE) that supports mutual authentication in a client-server s…☆87Updated last month
- (Oblivious) DoH Server☆26Updated 3 years ago
- A Golang implementation of the AES-FFX Format-Preserving Encryption Scheme☆10Updated 10 years ago
- MLS protocol☆239Updated last year
- Key agreement (X25519) and signing (ed25519), X25519 keys.☆37Updated 3 years ago
- Keysync periodically downloads secrets from Keywhiz☆66Updated 2 years ago
- Crypto Audit Guidelines☆134Updated 5 years ago
- Supporting materials for our EuroS&P paper: Automated Verification for Secure Messaging Protocols and their Implementations: A Symbolic a…☆37Updated 3 years ago
- ☆65Updated last year
- Zero knowledge push relay☆33Updated 6 years ago
- Fault attack agaisnt EdDSA demonstrated on an Arduino Nano board, allowing for partial key recovery and fake signatures.☆73Updated 8 years ago
- 🔍 Lens is an opt-in search engine and data collection tool to aid content discovery of the distributed web☆61Updated 6 years ago
- Bootstrapping secure communication without leaking metadata☆77Updated 6 years ago
- The OPAQUE Asymmetric PAKE Protocol☆112Updated last year
- Communications layer used for both the Oxen storage server and oxend☆19Updated 3 months ago
- Entity Attestation Token IETF Draft Standard☆20Updated 9 months ago
- Xoodyak, a lightweight and versatile cryptographic scheme implemented in Rust.☆30Updated 9 months ago
- Tool to easily encrypt and decrypt files to users and groups. Similar to GPG, but usable at scale.☆53Updated last week