defuse / ictmLinks
A user-first approach to threat modeling.
☆17Updated 3 months ago
Alternatives and similar repositories for ictm
Users that are interested in ictm are comparing it to the libraries listed below
Sorting:
- repository for tracking open tasks☆18Updated 7 years ago
- A coding challenge to learn Rust☆14Updated 7 years ago
- secure messaging, file-transfer, and directory synchronization☆41Updated 8 years ago
- 🎄🖋 A Rust implementation of Merkle signing☆15Updated 5 years ago
- A design for doing more private Signal groups using anonymous credentials based on algebraic MACs.☆14Updated 5 years ago
- reading lists☆31Updated 6 years ago
- Mix Network Bibliography☆15Updated 5 years ago
- misc stuff☆19Updated 8 years ago
- MLS architecture☆74Updated 4 months ago
- Infinitely presentable (aeon) rerandomisable (flux) anonymous credentials.☆28Updated 4 years ago
- free crypto audit☆31Updated 8 years ago
- a Private Publish Subscribe System☆50Updated last year
- Notes relating to secure messaging☆19Updated 9 years ago
- Secure multiparty messaging (kindof)☆21Updated 9 years ago
- This was a pure-Rust implementation of a rangeproof scheme. It is now obsoleted by Bulletproofs.☆16Updated 7 years ago
- ☆10Updated 6 years ago
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆28Updated 7 years ago
- Supporting materials for our EuroS&P paper: Automated Verification for Secure Messaging Protocols and their Implementations: A Symbolic a…☆37Updated 3 years ago
- mixminion is the main implementation of the Type III ("Mixminion") remailer protocol.☆61Updated 13 years ago
- Mirror of freehaven's anonymous research bibliography☆14Updated 10 years ago
- Rust bindings and key exchange for liboqs (Open Quantum Safe), a library for quantum-resistant cryptographic algorithms☆36Updated 4 years ago
- (Deprecated PoC) Innovative censorship evading technology based on p2p distributed caching network☆58Updated 8 years ago
- Keyname format for public-key fingerprints☆22Updated 11 years ago
- Docker environment that contains a Database, Monitor, Observatory and Analyzer☆14Updated 3 years ago
- ☆29Updated 11 years ago
- Models for authenticated key exchange in Tamarin☆12Updated 5 years ago
- axolotl based on libsodium☆22Updated 9 years ago
- Implementation and simulations for the "Reducing Metadata Leakage from Encrypted Data and Communication with PURBs" paper☆30Updated last year
- An android front-end to the zcash wallet through onion services☆13Updated 8 years ago
- A simple cryptosystem that provides provable plausibly deniable encryption.☆89Updated 6 years ago