david415 / reading_listsLinks
reading lists
☆31Updated 6 years ago
Alternatives and similar repositories for reading_lists
Users that are interested in reading_lists are comparing it to the libraries listed below
Sorting:
- specification and design documents☆54Updated 2 years ago
- Infinitely presentable (aeon) rerandomisable (flux) anonymous credentials.☆28Updated 4 years ago
- A design for doing more private Signal groups using anonymous credentials based on algebraic MACs.☆14Updated 5 years ago
- Mirror of all PDFs from the IACR's eprint☆46Updated last year
- ♥ ♥ ♥ Trevor's & Moxie's Axolotl Ratchet + AGL's xmpp-client ♥ ♥ ♥☆12Updated 10 years ago
- ☆10Updated 6 years ago
- repository for tracking open tasks☆18Updated 7 years ago
- A fork of floodyberry's ed25519-donna modified to support the Ristretto prime-order group☆14Updated 4 years ago
- A user-first approach to threat modeling.☆17Updated 3 weeks ago
- Experimental High Assurance Cryptographic Library☆20Updated 9 years ago
- Supporting materials for our EuroS&P paper: Automated Verification for Secure Messaging Protocols and their Implementations: A Symbolic a…☆36Updated 3 years ago
- A coding challenge to learn Rust☆14Updated 7 years ago
- ☆29Updated 10 years ago
- Mirror of freehaven's anonymous research bibliography☆14Updated 10 years ago
- Mix Network Bibliography☆15Updated 5 years ago
- library for implementing the server side of the mix network: mixes and providers☆26Updated 2 years ago
- Signature scheme submitted to NIST's Post-Quantum Cryptography Project☆28Updated 7 years ago
- A core and experimental implementation of ClaimChain☆34Updated 6 years ago
- secure messaging, file-transfer, and directory synchronization☆41Updated 7 years ago
- Links to stuff arising from or related to the HACS workshop.☆34Updated 7 years ago
- Towards an IETF RFC for XChaCha20-Poly1305☆28Updated 5 years ago
- QubesOS dom0 automation in Python☆12Updated 7 years ago
- axolotl based on libsodium☆22Updated 8 years ago
- IP-format-preserving encryption, with a dedicated 4-byte cipher☆105Updated 4 years ago
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆28Updated 7 years ago
- a Private Publish Subscribe System☆50Updated last year
- oht is an onion routed (using the Tor network, similar in design to ricochet and onionshare) distributed hash table to be used as the bas…☆45Updated 6 years ago
- Traffic analysis resistant messaging with Qt based user interface☆30Updated last year
- XChaCha8Blake3Siv is a nonce-reuse misuse-resistant (NRMR) and key-committing authenticated encryption with associated data (AEAD) algori…☆17Updated 3 years ago
- Decentralised gossip driven data sharing for the 21st century.☆59Updated last year