miscreant / meta
Meta-repository for Miscreant: misuse-resistant symmetric encryption library with AES-SIV (RFC 5297) and AES-PMAC-SIV support
☆474Updated 5 years ago
Related projects ⓘ
Alternatives and complementary repositories for meta
- Noise Specification☆449Updated 6 years ago
- Signed/Encrypted ARchive: always-encrypted tar-like archive tool with optional signature support☆355Updated last year
- YubiHSM2-backed signing server☆209Updated 6 years ago
- Constant-Time Toolkit☆294Updated 6 years ago
- A way to cryptographically hash objects (in the JSON-ish sense) that works cross-language. And, therefore, cross-encoding.☆149Updated last year
- opmsg message encryption☆750Updated last year
- Axolotl Protocol Implementation☆421Updated 3 months ago
- Pond☆912Updated 2 years ago
- A library for off-the-record (deniable authenticated forward secure confidential) multiparty messaging☆404Updated 7 years ago
- ☆363Updated 2 years ago
- Memory-hard scheme Argon2☆202Updated 3 years ago
- 🔑 Threshold Shamir's secret sharing in Rust☆258Updated 3 months ago
- an implementation of BLAKE3 verified streaming☆485Updated 2 weeks ago
- Macaroons are flexible authorization credentials that support decentralized delegation, attenuation, and verification.☆493Updated 3 years ago
- Decentralized Issue Tracking for git☆459Updated last year
- Off-the-Record Messaging Protocol version 4. -This is a draft- This repository is a mirror of http://bugs.otr.im/otrv4/otrv4☆189Updated 2 years ago
- Double Ratchet Algorithm☆377Updated 8 years ago
- Rust implementation of Noise☆125Updated 7 years ago
- A Go TLS/HTTPS server demo that uses a Yubikey as the backend for it's private key☆179Updated 6 years ago
- Securely locate peers without central servers☆151Updated 7 years ago
- PGP-like encryption + torrent-like addressing + blockchain-like enforcement of data expiry☆123Updated 7 years ago
- Data deduplication engine, supporting optional compression and public key encryption.☆833Updated 2 years ago
- a modern crypto messaging format☆993Updated 11 months ago
- Go server for two-man rule style file encryption and decryption.☆1,398Updated last week
- GPG Sync is designed to let users always have up-to-date public keys for other members of their organization☆345Updated last year
- Reviews of U2F devices☆433Updated 6 years ago
- A transparent and secure way to look up public keys.☆1,575Updated 3 years ago
- The scrypt key derivation function was originally developed for use in the Tarsnap online backup system and is designed to be far more se…☆473Updated last week
- Sphinx-based Password Storage low-level library☆128Updated 5 months ago
- One-end encryption, stronger than end-to-end☆196Updated last year