Golang Post Quantum Secure Wire
☆19Jul 31, 2025Updated 7 months ago
Alternatives and similar repositories for go-pqsw
Users that are interested in go-pqsw are comparing it to the libraries listed below
Sorting:
- Post-quantum Wireguard (Theory)☆12Sep 9, 2020Updated 5 years ago
- ☆28Nov 21, 2021Updated 4 years ago
- Go implementation of XMSS[MT] post-quantum hash-based signature scheme (rfc8391)☆24Jan 14, 2026Updated last month
- ☆33Feb 26, 2026Updated last week
- Implementation of do255e and do255s in Go☆23Dec 14, 2020Updated 5 years ago
- [RFC9380] Hash to curves - Rust reference implementation☆27Mar 10, 2024Updated last year
- Post-quantum cryptography certificates☆78Updated this week
- DobbsCoin (BOB) Core integration/staging tree☆11Aug 1, 2023Updated 2 years ago
- Hashing to Elliptic Curves☆80Sep 8, 2024Updated last year
- A privacy-preserving digital version of punch cards used in store loyalty programs☆11Apr 19, 2021Updated 4 years ago
- Drivers for interfacing HackRF radios with REDHAWK☆11Jun 18, 2020Updated 5 years ago
- A collection of post-quantum cryptographic algorithms (and emerging standards) implemented in Rust.☆16Jul 18, 2025Updated 7 months ago
- Online Binary Image Index☆13Nov 14, 2016Updated 9 years ago
- MemPool is a module created to simplify the debugging of application performance in Appcelerator's Titanium☆11Jan 19, 2013Updated 13 years ago
- A native iOS double slider for Titanium Mobile.☆27Feb 22, 2016Updated 10 years ago
- A TypeScript Attester using Turnstile for the Privacy Pass Authentication Protocol☆14Updated this week
- ☆11Sep 4, 2019Updated 6 years ago
- CLI for installrapp.com☆12Jun 9, 2016Updated 9 years ago
- XMSS[MT] commandline tool☆13Dec 18, 2023Updated 2 years ago
- Notes relating to secure messaging☆19Jun 11, 2016Updated 9 years ago
- Golang bindings for the Binary Ninja Arm64 Disassembler.☆14Nov 24, 2025Updated 3 months ago
- Provider library - a library of small helpers. These may or may not become part of OpenSSL at some point☆12May 15, 2025Updated 9 months ago
- I-D that describes the algorithm identifiers for NIST's PQC ML-DSA for use in the Internet X.509 Public Key Infrastructure☆14Oct 30, 2025Updated 4 months ago
- ☆10Feb 16, 2026Updated 2 weeks ago
- Models for authenticated key exchange in Tamarin☆12Oct 9, 2019Updated 6 years ago
- ☆10Nov 28, 2019Updated 6 years ago
- ☆10Oct 16, 2017Updated 8 years ago
- ☆11Jul 17, 2024Updated last year
- Content of chairs.ietf.org: the IETF Working Group chairs resources site☆13Updated this week
- CDLS: Proving Knowledge of Committed Discrete Logarithms with Soundness☆11Nov 2, 2024Updated last year
- K-means Algorithm in Ruby☆10Mar 14, 2015Updated 10 years ago
- The code used to generate the Quandoom QASM file☆15Nov 7, 2024Updated last year
- A Go library for parsing Intel HEX files☆12Feb 20, 2026Updated 2 weeks ago
- Dragons is an undetectable reverse TCP shell impelemntation based on websockets, but with a user-friendly web interface with support for …☆12Jan 3, 2023Updated 3 years ago
- Mobile Tuts Plus UIStoryboard☆22Nov 30, 2011Updated 14 years ago
- Examples written using Mechanoid framework for WASM-based embedded development.☆13Mar 20, 2025Updated 11 months ago
- Succinct cheatsheet of algorithms and when to use them☆10Sep 13, 2016Updated 9 years ago
- Exploits weaknesses in RC4 to mount a chosen-plaintext attack and recover the private key. The vulnerability is similar to the one used t…☆12Nov 22, 2022Updated 3 years ago
- A Forth interpreter in ARM assembly☆16May 11, 2009Updated 16 years ago