katzenpost / mixnet_uprisingLinks
repository for tracking open tasks
☆18Updated 7 years ago
Alternatives and similar repositories for mixnet_uprising
Users that are interested in mixnet_uprising are comparing it to the libraries listed below
Sorting:
- ♥ ♥ ♥ Trevor's & Moxie's Axolotl Ratchet + AGL's xmpp-client ♥ ♥ ♥☆12Updated 10 years ago
- Mix Network Bibliography☆15Updated 5 years ago
- Secure multiparty messaging (kindof)☆21Updated 9 years ago
- DEPRECATED: A C++ Elligator2 implementation☆15Updated 5 years ago
- a Private Publish Subscribe System☆50Updated last year
- a CCA-secure module-lattice-based KEM☆16Updated 6 years ago
- Deterministic And Verifiable Randomness On Schnorr signatures☆13Updated 7 years ago
- OPAQUE asymmetric PAKE, and its threshold implementation. Experimental, not audited.☆17Updated 4 years ago
- A core and experimental implementation of ClaimChain☆34Updated 6 years ago
- reading lists☆31Updated 6 years ago
- Delicious Onion Service Wraps.☆23Updated 10 years ago
- axolotl based on libsodium☆22Updated 9 years ago
- mixminion is the main implementation of the Type III ("Mixminion") remailer protocol.☆61Updated 13 years ago
- tunnel traffic through a genuine bittorrent connection☆66Updated 6 years ago
- Deterministic build environment for Zcash☆19Updated last month
- ☆58Updated 8 years ago
- 🎄🖋 A Rust implementation of Merkle signing☆15Updated 5 years ago
- Off-the-Record Messaging Protocol version 4. -This is a draft- This repository is a mirror of http://bugs.otr.im/otrv4/otrv4☆190Updated 2 years ago
- The Onion Name System - networking protocols☆17Updated 8 years ago
- Infinitely presentable (aeon) rerandomisable (flux) anonymous credentials.☆28Updated 4 years ago
- CoSi command line interface☆21Updated 8 years ago
- The secure messaging summit information☆20Updated 4 years ago
- "control-port-filter" without the bash☆14Updated 9 years ago
- A BibTeX collection on Zero-Knowledge Proofs☆16Updated 6 years ago
- oht is an onion routed (using the Tor network, similar in design to ricochet and onionshare) distributed hash table to be used as the bas…☆46Updated 6 years ago
- Challenge Bypass using the Ristretto group☆36Updated last month
- A user-first approach to threat modeling.☆18Updated 5 months ago
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆28Updated 7 years ago
- Authenticated encryption scheme prover/synthesizer☆15Updated 3 years ago
- Supporting materials for our EuroS&P paper: Automated Verification for Secure Messaging Protocols and their Implementations: A Symbolic a…☆37Updated 3 years ago