Guidelines, procedures, and templates used by the IETF Moderators team.
☆23Feb 17, 2026Updated last week
Alternatives and similar repositories for Moderators
Users that are interested in Moderators are comparing it to the libraries listed below
Sorting:
- Content of chairs.ietf.org: the IETF Working Group chairs resources site☆13Feb 20, 2026Updated last week
- ☆14Apr 14, 2025Updated 10 months ago
- Official SQISignHD code, version under continuous development.☆12Jul 18, 2025Updated 7 months ago
- Implementations of do255e and do255s in C and assembly☆25May 3, 2021Updated 4 years ago
- CDLS: Proving Knowledge of Committed Discrete Logarithms with Soundness☆11Nov 2, 2024Updated last year
- High Assurance Cryptographic Software☆10Dec 23, 2025Updated 2 months ago
- Post-quantum Wireguard (Theory)☆12Sep 9, 2020Updated 5 years ago
- Materials accompanying "Implementing an Elliptic Curve in Go"☆13Jul 29, 2017Updated 8 years ago
- ☆11Mar 19, 2023Updated 2 years ago
- [work in progress] Python framework for supporting cryptographic game-hopping proofs☆13Oct 19, 2022Updated 3 years ago
- Mirror of http://sourceforge.net/p/ed448goldilocks/code/ci/master/tree/☆33Jun 29, 2015Updated 10 years ago
- ☆15Updated this week
- A BibTeX collection on Isogeny-based Cryptography☆18Jan 20, 2023Updated 3 years ago
- Elliptic curves Rust reference implementation☆16Mar 10, 2024Updated last year
- ☆17Aug 26, 2025Updated 6 months ago
- An implementation of Mike Hamburg's Ed448 (Goldilocks) curve - derived from libdecaf. This is a mirror of https://bugs.otr.im/otrv4/libgo…☆19Mar 16, 2020Updated 5 years ago
- This is only the beginning.☆19Feb 9, 2026Updated 2 weeks ago
- Stronger and Faster Side-Channel Protections for CSIDH☆20Dec 20, 2020Updated 5 years ago
- Internet-Draft on IP address privacy☆17Mar 30, 2025Updated 11 months ago
- ☆21Dec 16, 2022Updated 3 years ago
- ☆19Nov 22, 2025Updated 3 months ago
- BAT KEM/Signature Reference Implementation☆23Dec 28, 2021Updated 4 years ago
- Reference implementations of post-quantum cryptographic primitives☆33Feb 16, 2026Updated last week
- Implementations of a fast Elliptic-curve Diffie-Hellman primitive☆27Apr 13, 2015Updated 10 years ago
- libsodium node.js bindings☆20Apr 25, 2016Updated 9 years ago
- Implementation of do255e and do255s in Go☆23Dec 14, 2020Updated 5 years ago
- Package fourq implements FourQ, a high-speed elliptic curve at the 128-bit security level.☆54Oct 14, 2024Updated last year
- The secure messaging summit information☆20Oct 27, 2020Updated 5 years ago
- Generate RFCs and IETF drafts from document source in XML according to the IETF xml2rfc v2 and v3 vocabularies☆108Jan 21, 2026Updated last month
- BLAKE2 AVX2 implementations☆24Dec 22, 2019Updated 6 years ago
- Proof-of-concept implementation of the (V)OPRF protocol in https://datatracker.ietf.org/doc/draft-irtf-cfrg-voprf/☆23Aug 24, 2020Updated 5 years ago
- Rust crate for obtaining the local network interface name and MTU towards a given IP address☆30Sep 2, 2025Updated 5 months ago
- Circuits for functions of interest to cryptography☆28Jan 31, 2024Updated 2 years ago
- The Tao of the IETF☆30Feb 13, 2024Updated 2 years ago
- ORCID Example Client Application (JOPMTS)☆18May 21, 2014Updated 11 years ago
- Crypto library☆67Dec 9, 2025Updated 2 months ago
- Golang (X)ChaCha20 stream cipher. (Mirror)☆60May 2, 2023Updated 2 years ago
- Specifications for Privacy Proxy Implementations☆32Feb 19, 2026Updated last week
- [RFC9380] Hash to curves - Rust reference implementation☆28Mar 10, 2024Updated last year