distrust-foundation / AirgapOS
☆18Updated last year
Related projects ⓘ
Alternatives and complementary repositories for AirgapOS
- Rust source code for the FrodoPIR Private Information Retrieval scheme.☆60Updated 10 months ago
- a Private Publish Subscribe System☆48Updated 6 months ago
- OPAQUE protocol, a secure asymmetric password authenticated key exchange (aPAKE) that supports mutual authentication in a client-server s…☆74Updated 3 years ago
- Nitrokey WebSmartCard Specification and Documentation☆28Updated last year
- ☆11Updated last year
- Katzenpost is a free and open source software project dedicated to researching and developing mix network protocols☆92Updated this week
- A Rust implementation of the Message Layer Security group messaging protocol☆115Updated last year
- ☆81Updated 4 years ago
- specification and design documents☆53Updated last year
- QubesOS dom0 automation in Python☆12Updated 7 years ago
- A runbook for the PSF, for TUF key setup and initial signing operations to bootstrap signing for PyPI.☆15Updated 2 years ago
- Communicate with Nitrokey devices in a clean and easy manner☆65Updated 9 months ago
- Hardware private key storage for next-generation cryptography (e.g. BLS) supporting USB armory MkII devices☆110Updated 10 months ago
- The Mesh is an infrastructure that makes the Internet easier to use by making it more secure.☆40Updated 2 weeks ago
- Pure Rust client for YubiHSM2 devices☆70Updated 4 years ago
- Wiki for Noise development☆81Updated 8 years ago
- a Tahoe-LAFS storage-system plugin which authorizes storage operations based on privacy-respecting tokens☆10Updated this week
- An Rust implementation of FROST: Flexible Round-Optimised Schnorr Threshold signatures using the Ristretto group☆66Updated 2 years ago
- A design for doing more private Signal groups using anonymous credentials based on algebraic MACs.☆14Updated 4 years ago
- Deterministic/nonce-reuse resistant authenticated encryption scheme using XChaCha20, implemented on libsodium.☆28Updated 3 months ago
- Tools for power measurements of post-quantum cryptographic algorithms☆26Updated 4 years ago
- Auditing Applied Cryptography☆10Updated 5 years ago
- Implementation and simulations for the "Reducing Metadata Leakage from Encrypted Data and Communication with PURBs" paper☆30Updated last year
- Rust Nym Bitcoin Transaction Broadcaster☆31Updated 3 years ago
- The Onion Name System - Tor Browser integration☆12Updated 8 years ago
- The OnlyKey Python Command-Line Utility is a command line tool targeted towards more advanced users. This can be used for configuration a…☆48Updated last year
- Oblivious Pseudorandom Functions (OPRFs) using Prime-Order Groups☆39Updated 2 months ago
- ☆13Updated 10 months ago