noiseprotocol / noise_specView external linksLinks
Noise Specification
☆462Oct 17, 2018Updated 7 years ago
Alternatives and similar repositories for noise_spec
Users that are interested in noise_spec are comparing it to the libraries listed below
Sorting:
- Rust implementation of Noise☆126May 31, 2017Updated 8 years ago
- Noise-C, a plain C implementation of the Noise protocol☆357Jul 18, 2024Updated last year
- Reference implementations (software)☆85Nov 11, 2016Updated 9 years ago
- Go implementation of the Noise Protocol Framework☆567Feb 18, 2024Updated last year
- Double Ratchet Algorithm☆375Mar 30, 2016Updated 9 years ago
- Pond☆920Dec 17, 2021Updated 4 years ago
- ☆58Mar 6, 2017Updated 8 years ago
- Signed/Encrypted ARchive: always-encrypted tar-like archive tool with optional signature support☆355Jan 11, 2023Updated 3 years ago
- TLS Library in python☆237Apr 5, 2022Updated 3 years ago
- salty privacy☆52Aug 24, 2020Updated 5 years ago
- [INACTIVE] const-time Rust experiment☆98Nov 2, 2015Updated 10 years ago
- Capability-based secure key management and credential storage☆120Mar 21, 2013Updated 12 years ago
- Keyname format for public-key fingerprints☆22Jun 4, 2014Updated 11 years ago
- Axolotl Protocol Implementation☆421Jan 27, 2026Updated 2 weeks ago
- "control-port-filter" without the bash☆14Jun 4, 2016Updated 9 years ago
- List of crypto projects that might not suck☆423Jan 17, 2023Updated 3 years ago
- Naehrig, Niederhagen and Schwabe's pairings code, massaged into a shared library.☆17Apr 19, 2016Updated 9 years ago
- Wiki for Noise development☆81Apr 21, 2016Updated 9 years ago
- A JavaScript implementation of axolotl. Axolotl is a ratcheting forward secrecy protocol.☆75Feb 1, 2016Updated 10 years ago
- Shamir's secret-sharing method in the Galois Field GF(2**8), modified implementation of the original by Daniel Silverstone☆10Jun 11, 2020Updated 5 years ago
- Sign and verify author signatures on git commits☆17Sep 20, 2014Updated 11 years ago
- awaits the completion of multiple async tasks☆12Nov 29, 2015Updated 10 years ago
- A memory-hard password hashing function.☆71May 29, 2023Updated 2 years ago
- Implementations of a fast Elliptic-curve Diffie-Hellman primitive☆342Dec 17, 2021Updated 4 years ago
- opmsg message encryption☆757Mar 2, 2023Updated 2 years ago
- Private messaging system that hides metadata☆2,486Sep 12, 2019Updated 6 years ago
- A Java port of TweetNaCl from the original C☆22Nov 6, 2025Updated 3 months ago
- Dumb self-contained scrypt implementation☆25Jan 26, 2017Updated 9 years ago
- Docker environment that contains a Database, Monitor, Observatory and Analyzer☆14Sep 29, 2021Updated 4 years ago
- This was a pure-Rust implementation of a rangeproof scheme. It is now obsoleted by Bulletproofs.☆16Jul 24, 2018Updated 7 years ago
- Go implementation of NORX (https://norx.io)☆24Nov 6, 2015Updated 10 years ago
- An implementation of the TLS/SSL protocols☆4,687Updated this week
- A lightweight, secure, easy-to-use crypto library suitable for constrained environments.☆746Updated this week
- WARNING: Deprecated! See Privacy Pass☆99Jan 5, 2017Updated 9 years ago
- Off-the-Record Messaging Protocol version 4. -This is a draft- This repository is a mirror of http://bugs.otr.im/otrv4/otrv4☆192Oct 17, 2022Updated 3 years ago
- An experiment.☆4,050Updated this week
- A fork of floodyberry's ed25519-donna modified to support the Ristretto prime-order group☆15Jan 15, 2021Updated 5 years ago
- String phone is a secure communications protocol and library geared towards embedded devices.☆14Nov 15, 2015Updated 10 years ago
- Tools and ideas to help with PGP keys and fingerprint verification☆58Dec 2, 2023Updated 2 years ago