Timelock Encryption made practical. The Go `tlock` library and the `tle` cmd line tool home to encrypt towards the future.
☆635Dec 22, 2025Updated 3 months ago
Alternatives and similar repositories for tlock
Users that are interested in tlock are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A dead man's switch for full but responsible disclosure of vulnerabilities☆63Oct 15, 2024Updated last year
- Rust encryption library for practical time-lock encryption.☆37Mar 18, 2026Updated last week
- 🎲 A Distributed Randomness Beacon Daemon - Go implementation☆810Mar 23, 2026Updated last week
- Storage for hashes, targeted at content addressable systems☆14Feb 22, 2026Updated last month
- Age plugin to split keys and wrap them with different recipients using Shamir's Secret Sharing.☆54Dec 30, 2025Updated 3 months ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Memorize a 128-bit AES key in 5 minutes☆12Dec 29, 2024Updated last year
- ☆15Sep 28, 2020Updated 5 years ago
- Verify your NIPoPoWs efficiently, here☆11Dec 8, 2022Updated 3 years ago
- A simple, modern and secure encryption tool (and Go library) with small explicit keys, no config options, and UNIX-style composability.☆21,747Mar 20, 2026Updated last week
- Arkworks bindings to Circom's R1CS, for Groth16 Proof and Witness generation in Rust.☆281Aug 26, 2025Updated 7 months ago
- Prove multi-opens of EIP-4844 KZG blobs☆16Jun 15, 2023Updated 2 years ago
- cpp witness calculator for mobile and desktop for iden3 circuits☆17Aug 22, 2025Updated 7 months ago
- libp2p Collaborative Notebook for Research☆38May 1, 2025Updated 10 months ago
- Where I create DAS Nodes that utilize a Secure Kademlia DHT Discv5 overlay☆16May 5, 2023Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Age based repository file encryption gitops tool☆349Jan 15, 2026Updated 2 months ago
- Rust implementation of the TLSNotary protocol☆406Mar 13, 2026Updated 2 weeks ago
- Secp256k1 blind signature certification authority boilerplate☆11Apr 23, 2024Updated last year
- OPAQUE asymmetric PAKE, and its threshold implementation. Experimental, not audited.☆17Jun 16, 2021Updated 4 years ago
- Identity Based Encryption schemes on the BLS12-381 pairing-friendly elliptic curve☆20Aug 31, 2021Updated 4 years ago
- implementation of a libp2p transport using the Nym mixnet☆23Jun 25, 2023Updated 2 years ago
- TEE stack for Seismic☆17Feb 25, 2026Updated last month
- Linearly Homomorphic Time Lock Puzzle Library☆31Mar 30, 2020Updated 5 years ago
- yubikey-agent is a seamless ssh-agent for YubiKeys.☆2,866Dec 3, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- A secret manager backed by age☆129Mar 2, 2026Updated 3 weeks ago
- A fork of password-store (https://www.passwordstore.org) that uses age (https://age-encryption.org) as backend.☆1,079Aug 30, 2024Updated last year
- A collection of open source tlog tooling.☆24Feb 10, 2026Updated last month
- A Virtual FIDO2 USB Device☆1,359Aug 1, 2024Updated last year
- World's first implementation of a (possibly) secure witness encryption scheme. Uses the CLT13 multilinear map.☆36Jan 12, 2022Updated 4 years ago
- A collection of informal and practical definitions for common jargon found in the zero-knowledge literature.☆114Jan 1, 2026Updated 2 months ago
- Generic Go Kademlia implementation☆18Feb 12, 2026Updated last month
- simple Rust CLI tool to derive an age private key from passphrase☆40Dec 28, 2025Updated 3 months ago
- Witness encryption for KZG openings☆33Nov 6, 2024Updated last year
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Generator and supporting evidence for security of the Pallas/Vesta pair of elliptic curves suitable for Halo☆60May 19, 2023Updated 2 years ago
- A DHT Indexer node & Peer Router☆89Jun 11, 2024Updated last year
- Based on https://eprint.iacr.org/2022/1510☆26Oct 20, 2024Updated last year
- CIRCL: Cloudflare Interoperable Reusable Cryptographic Library☆1,647Updated this week
- Friendly protocol negotiation. It enables a multicodec to be negotiated between two entities.☆64Apr 28, 2025Updated 11 months ago
- Age plugin to encrypt files with fido2 tokens using the hmac-secret extension and non-discoverable credentials.☆84Dec 30, 2025Updated 3 months ago
- Go Ed25519 suitable for use in consensus-critical contexts.☆52Jan 18, 2024Updated 2 years ago