Timelock Encryption made practical. The Go `tlock` library and the `tle` cmd line tool home to encrypt towards the future.
☆628Dec 22, 2025Updated 2 months ago
Alternatives and similar repositories for tlock
Users that are interested in tlock are comparing it to the libraries listed below
Sorting:
- A dead man's switch for full but responsible disclosure of vulnerabilities☆62Oct 15, 2024Updated last year
- Timelock Encryption made practical. A Typescript library for encrypting for the future.☆121Mar 18, 2024Updated last year
- Rust encryption library for practical time-lock encryption.☆37Jul 19, 2024Updated last year
- 🎲 A Distributed Randomness Beacon Daemon - Go implementation☆806Jan 15, 2026Updated last month
- Secp256k1 blind signature certification authority boilerplate☆11Apr 23, 2024Updated last year
- Age plugin to split keys and wrap them with different recipients using Shamir's Secret Sharing.☆53Dec 30, 2025Updated 2 months ago
- ☆15Sep 28, 2020Updated 5 years ago
- A simple, modern and secure encryption tool (and Go library) with small explicit keys, no config options, and UNIX-style composability.☆21,436Feb 2, 2026Updated last month
- Age based repository file encryption gitops tool☆347Jan 15, 2026Updated last month
- Verify your NIPoPoWs efficiently, here☆11Dec 8, 2022Updated 3 years ago
- A Virtual FIDO2 USB Device☆1,354Aug 1, 2024Updated last year
- A collection of open source tlog tooling.☆23Feb 10, 2026Updated 2 weeks ago
- Linearly Homomorphic Time Lock Puzzle Library☆31Mar 30, 2020Updated 5 years ago
- A fork of password-store (https://www.passwordstore.org) that uses age (https://age-encryption.org) as backend.☆1,070Aug 30, 2024Updated last year
- yubikey-agent is a seamless ssh-agent for YubiKeys.☆2,857Dec 3, 2023Updated 2 years ago
- Identity Based Encryption schemes on the BLS12-381 pairing-friendly elliptic curve☆20Aug 31, 2021Updated 4 years ago
- Where I create DAS Nodes that utilize a Secure Kademlia DHT Discv5 overlay☆16May 5, 2023Updated 2 years ago
- An O(N\log{N}) time algorithm for computing all N proofs fast in the Pointproofs VC. Also, the O(N\log{N}) time Feist-Khovratovich algori…☆13Dec 3, 2020Updated 5 years ago
- simple Rust CLI tool to derive an age private key from passphrase☆40Dec 28, 2025Updated 2 months ago
- A secret manager backed by age☆129Jan 5, 2026Updated last month
- Linux UEFI library written in pure Go.☆164Oct 10, 2025Updated 4 months ago
- World's first implementation of a (possibly) secure witness encryption scheme. Uses the CLT13 multilinear map.☆36Jan 12, 2022Updated 4 years ago
- NIST P elliptic curves (re-exported from crypto/internal/nistec)☆52Oct 31, 2025Updated 4 months ago
- Generator and supporting evidence for security of the Pallas/Vesta pair of elliptic curves suitable for Halo☆59May 19, 2023Updated 2 years ago
- libp2p Collaborative Notebook for Research☆38May 1, 2025Updated 10 months ago
- Go Ed25519 suitable for use in consensus-critical contexts.☆52Jan 18, 2024Updated 2 years ago
- Gemini IPFS Gateway☆22Dec 11, 2025Updated 2 months ago
- filippo.io/edwards25519 — A safer, faster, and more powerful low-level edwards25519 Go implementation.☆179Feb 17, 2026Updated last week
- Arkworks bindings to Circom's R1CS, for Groth16 Proof and Witness generation in Rust.☆278Aug 26, 2025Updated 6 months ago
- OPAQUE asymmetric PAKE, and its threshold implementation. Experimental, not audited.☆17Jun 16, 2021Updated 4 years ago
- A basic DNG codec reader for Golang☆18Jul 30, 2023Updated 2 years ago
- Rust library for practical time-lock encryption using `drand` threshold network☆41Dec 24, 2022Updated 3 years ago
- RISC Zero is a zero-knowledge verifiable general computing platform based on zk-STARKs and the RISC-V microarchitecture.☆2,087Updated this week
- A simple, secure and modern file encryption tool (and Rust library) with small explicit keys, no config options, and UNIX-style composabi…☆3,317Feb 10, 2026Updated 2 weeks ago
- YubiKey plugin for age☆842Dec 22, 2025Updated 2 months ago
- A collection of informal and practical definitions for common jargon found in the zero-knowledge literature.☆114Jan 1, 2026Updated 2 months ago
- ☆868Sep 8, 2022Updated 3 years ago
- A Pluggable Authentication Module (PAM) which allows the establishment of alternate passwords that can be used to perform actions to clea…☆1,397Oct 15, 2025Updated 4 months ago
- ☆42Oct 19, 2021Updated 4 years ago