joshua-m-david / jerichoencryption
Jericho Chat - Information-theoretically secure communications
☆21Updated 3 months ago
Alternatives and similar repositories for jerichoencryption:
Users that are interested in jerichoencryption are comparing it to the libraries listed below
- Git repository syncronisation daemon☆54Updated 7 years ago
- Reference implementations (software)☆85Updated 8 years ago
- Hashing tool supporting md5,sha1,sha256,sha512,whirlpool,jh and hmac versions of these. Includes recursive file hashing and other feature…☆64Updated 2 months ago
- Encrypted Text Messaging☆147Updated 9 years ago
- axolotl based on libsodium☆22Updated 8 years ago
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆28Updated 6 years ago
- An open source encryption program that uses the "one-time pad" method.☆32Updated 4 years ago
- Subgraph OS Handbook☆120Updated 7 years ago
- Experimental High Assurance Cryptographic Library☆20Updated 9 years ago
- Helpful utilities and documentation for Free Software live audio/video streaming☆77Updated 10 years ago
- Tools for attacking cryptographic implementations.☆21Updated 8 years ago
- Simple command-line client and Node.js library for use img.bi☆34Updated 9 years ago
- Secure Internet Live Conferencing☆64Updated 7 years ago
- CryptoTE - Text Editor with Transparent Encryption☆44Updated 8 years ago
- Encrypted, compressed, distributed backups☆26Updated 9 years ago
- Repository of maintained OZ profiles and seccomp filters.☆14Updated 7 years ago
- System tuning recommendations for running cryptographic applications☆23Updated 8 years ago
- An encryption tool for creating file archives☆26Updated last year
- https://git.gir.st/base65536.git - Seldomly Updated Mirror: Unicode's answer to Base64 for the UNIX command line☆21Updated 6 years ago
- Lightweight cryptographic hash functions (reference code)☆16Updated 10 years ago
- Small program to read lists of Tor exit nodes and draw picture showing when they join/leave list☆28Updated 8 years ago
- Work-in-progress Dissent port/rewrite for low-latency anonymous communication☆11Updated 6 years ago
- Hyperboria (CJDNS network) map☆63Updated 5 years ago
- Whitelist Tor exit relays to allowing Tor users access your CloudFlare-protected site without CAPTCHA's☆62Updated 8 years ago
- Hourglass cryptographically locks your files so they can only be read after a certain amount of time.☆25Updated 8 years ago
- An add-on to help TOR users find hidden services for ClearNet sites they use every day☆32Updated 7 years ago
- An exercise in cryptographic minimlism☆24Updated 10 years ago
- Tools and ideas to help with PGP keys and fingerprint verification☆58Updated last year
- opmsg p2p transport network☆71Updated 6 years ago
- ☆139Updated 5 years ago