danwallach / STAR-Vote
The secure, transparent, auditable, reliable electronic voting system
☆14Updated 8 years ago
Alternatives and similar repositories for STAR-Vote:
Users that are interested in STAR-Vote are comparing it to the libraries listed below
- An Operating Function☆329Updated 10 years ago
- Keyname format for public-key fingerprints☆22Updated 10 years ago
- This was a pure-Rust implementation of a rangeproof scheme. It is now obsoleted by Bulletproofs.☆16Updated 6 years ago
- secure messaging, file-transfer, and directory synchronization☆41Updated 7 years ago
- a list of public cabals☆18Updated 6 months ago
- ipfs data visualizations☆30Updated 8 years ago
- A user-first approach to threat modeling.☆16Updated 5 years ago
- Scripts that I used to write a blog post about section 7.24.1(2) of C11☆11Updated 8 years ago
- Sharing scientific papers using ipfs☆14Updated 8 years ago
- Collection of test vectors for cryptographic operations☆11Updated 9 years ago
- [ARCHIVED] DEPRECATED — ipfs-web-app tool☆19Updated 4 years ago
- ☆20Updated 9 years ago
- Python bindings to the Crypto++ library☆48Updated last year
- Crawl GitHub issues to build a dependency graph☆19Updated 8 years ago
- multiaddr implementation in Python☆33Updated last year
- Notes relating to secure messaging☆19Updated 8 years ago
- Least Authority S4☆14Updated 2 years ago
- A fork of floodyberry's ed25519-donna modified to support the Ristretto prime-order group☆14Updated 4 years ago
- Script to publish locally saved asciicast to IPFS☆18Updated 7 years ago
- Signed list of OpenPGP fingerprints for First Look employees☆14Updated 2 months ago
- Proof of concept for converting any content into a domain name.☆310Updated 11 years ago
- reading lists☆31Updated 6 years ago
- Server & client software for Firewall Cafe☆3Updated 2 weeks ago
- a web page / paper☆18Updated 8 years ago
- Safely print shared library dependencies (similar to ldd)☆23Updated last year
- Dan Kaminsky's clock drift entropy generator☆6Updated 10 years ago
- Shamir's secret-sharing method in the Galois Field GF(2**8), modified implementation of the original by Daniel Silverstone☆10Updated 4 years ago
- Website for Modern PGP☆14Updated 7 years ago
- Acorn Player☆22Updated 11 years ago
- Planning for next generation secure chat.☆37Updated 10 years ago