ietf / ModeratorsLinks
Guidelines, procedures, and templates used by the IETF Moderators team.
☆18Updated 8 months ago
Alternatives and similar repositories for Moderators
Users that are interested in Moderators are comparing it to the libraries listed below
Sorting:
- ☆14Updated last week
- Agenda/Minutes of Anti-Fraud Community Group meetings.☆19Updated 3 weeks ago
- A template repository for Internet-Draft management☆82Updated last month
- Hybrid Public Key Encryption☆51Updated last year
- ☆13Updated 2 months ago
- A Prio server implementation.☆71Updated last year
- ☆159Updated 2 weeks ago
- Slides and other working group materials☆11Updated last year
- Proof-of-possession for KEM certificates using verifiable generation☆9Updated 3 years ago
- Repo for DTLS 1.3☆32Updated 3 months ago
- Post-quantum cryptography certificates☆66Updated last month
- ☆40Updated 3 weeks ago
- ☆16Updated 2 weeks ago
- A template for IETF internet draft git repositories☆228Updated 3 weeks ago
- Certificate Transparency RFC☆80Updated 3 years ago
- Mirror of http://sourceforge.net/p/ed448goldilocks/code/ci/master/tree/☆33Updated 10 years ago
- Implementation of cryptographic primitives in Go☆12Updated 2 years ago
- index.py is a python CGI script that provides a Webhook to be used as a github hook endpoint to send mail to a set of email addresses whe…☆19Updated 2 months ago
- A place to discuss Private Measurement☆12Updated last year
- Interoperability testing of TLS implementations.☆11Updated last year
- Implementation of draft-irtf-cfrg-hpke☆30Updated 2 years ago
- This document describes the Distributed Aggregation Protocol (DAP) being developed by the PPM working group at IETF.☆50Updated this week
- Interoperable Private Attribution (IPA) - A Private Measurement Proposal☆39Updated 5 months ago
- WebAppSec Upgrade Insecure Requests☆8Updated 5 months ago
- Signature-based Resource Loading Restrictions☆39Updated last month
- Specifications for Privacy Proxy Implementations☆31Updated 2 weeks ago
- BLAKE2 AVX2 implementations☆23Updated 5 years ago
- Documents covering web security concepts, specifications, and findings.☆8Updated 9 years ago
- An implementation of Mike Hamburg's Ed448 (Goldilocks) curve - derived from libdecaf. This is a mirror of https://bugs.otr.im/otrv4/libgo…☆18Updated 5 years ago
- TLS WG Wiki☆13Updated 2 weeks ago