haskell-cryptography / cacophonyLinks
A Haskell library implementing the Noise protocol.
☆104Updated last year
Alternatives and similar repositories for cacophony
Users that are interested in cacophony are comparing it to the libraries listed below
Sorting:
- Double ratchet algorithm for E2E encryption☆59Updated 7 years ago
- A haskell library implementing the Kademlia DHT☆43Updated 7 years ago
- Hackage security framework based on TUF (The Update Framework)☆63Updated last week
- Implementation of cryptographic primitives using Idris☆123Updated 7 years ago
- Multihash Haskell implementation☆28Updated 2 years ago
- A Haskell client library for the IPFS API☆26Updated 8 years ago
- Cryptographic library for Haskell☆69Updated 11 months ago
- The security-centric web platform framework☆53Updated 9 years ago
- A Haskell library providing BLAKE2☆11Updated 2 years ago
- Labeled IO Library☆59Updated 5 years ago
- Small minimal examples of modern cryptographic techniques in Haskell☆77Updated 6 years ago
- Cryptography that's easy to digest (NaCl/libsodium bindings)☆63Updated 11 months ago
- A DSL for describing and implementing communication protocols☆84Updated 11 years ago
- SPAKE2 key exchange protocol for Haskell☆14Updated 2 years ago
- A secure sandboxed Haskell interpreter for pure function evaluation☆76Updated last year
- A hip inductive theorem prover!☆90Updated 4 years ago
- Distributed programming language that desugars to Morte☆92Updated 3 years ago
- ☆21Updated 7 years ago
- The haskell network stack☆118Updated 8 years ago
- Some writings about a type system for nix☆19Updated 8 years ago
- Cryptobox Haskell FFI☆27Updated last year
- Drafts, notes and resources for adding linear typing to GHC.☆79Updated 5 years ago
- An XMPP client library for Haskell.☆53Updated 4 years ago
- High level Haskell bindings to LXC (Linux containers).☆51Updated 10 years ago
- Translate Pascal into Haskell☆51Updated 6 years ago
- Tool to determine relevant parts of binary data☆44Updated 8 years ago
- DNS libary in Haskell☆63Updated last year
- Shamir secret sharing in Haskell.☆15Updated 8 years ago
- JVM implementation in Haskell☆44Updated last year
- ☆78Updated last month