grnet / zeusLinks
Zeus server
☆60Updated 11 months ago
Alternatives and similar repositories for zeus
Users that are interested in zeus are comparing it to the libraries listed below
Sorting:
- Merkle-tree in Python☆73Updated 6 months ago
- Big Scale Decision Making Tool☆12Updated 5 years ago
- Supporting materials for our EuroS&P paper: Automated Verification for Secure Messaging Protocols and their Implementations: A Symbolic a…☆36Updated 3 years ago
- DEciding Equivalence Properties in SECurity protocols☆18Updated 2 years ago
- A core and experimental implementation of ClaimChain☆34Updated 6 years ago
- An Implementation of the Fully Homomorphic Smart-Vercauteren Cryptosystem☆44Updated 9 years ago
- This is a Tamarin model of TLS 1.3☆37Updated last year
- the independent voting booth for Helios☆17Updated 4 years ago
- Helios server☆754Updated 8 months ago
- Secure multiparty messaging (kindof)☆21Updated 9 years ago
- js-ctypes wrapper for libotr☆29Updated 7 years ago
- Chainspace is a distributed ledger platform for high-integrity and transparent processing of transactions within a decentralized system.☆56Updated 6 years ago
- An implementation of Mike Hamburg's Ed448 (Goldilocks) curve - derived from libdecaf. This is a mirror of https://bugs.otr.im/otrv4/libgo…☆18Updated 5 years ago
- Implementation of Kravatte Encryption Suite☆16Updated 6 years ago
- Generic anonymous routing protocol framework agnostic to encryption algorithm and transport layer☆15Updated 6 years ago
- specification and design documents☆54Updated 2 years ago
- A Python implementation of the Crypto-Conditions spec☆72Updated 2 years ago
- The secure messaging summit information☆20Updated 4 years ago
- Backport of hashlib.sha3 for 2.7 to 3.5☆29Updated 2 years ago
- an open-source, open-audit, web-based voting system -- DEPRECATED, use helios-server☆33Updated 15 years ago
- Links to stuff arising from or related to the HACS workshop.☆34Updated 7 years ago
- Peer DID method implementation in Python☆12Updated last year
- FairCoin Core working tree☆79Updated 3 years ago
- reading lists☆31Updated 6 years ago
- Keyname format for public-key fingerprints☆22Updated 11 years ago
- ☆71Updated 6 years ago
- Verifiable Credentials Use Cases☆51Updated last month
- Value Distribution Protocol☆24Updated 7 years ago
- Protected E-mail Headers☆73Updated 5 years ago
- Files of IRTF HRPC research group☆19Updated 6 years ago