privacybydesign / irmago
IRMA server, client, and tooling. Documentation: http://docs.yivi.app/irma-cli
☆72Updated this week
Alternatives and similar repositories for irmago:
Users that are interested in irmago are comparing it to the libraries listed below
- Implementation of the Idemix attribute based credential scheme used in IRMA☆11Updated 3 months ago
- IRMA app for iOS and Android☆26Updated 4 years ago
- A DID method implementation that extends the Sidetree protocol into a Fediverse of interconnected nodes and witnessed using certificate t…☆35Updated last year
- RWOT9 in Prague, The Czech Republic (September 2019)☆114Updated 2 years ago
- WebAuthn server library decoupled from http for easy intergration, provides WebAuthn registration and authentication for clients using FI…☆43Updated 4 years ago
- Specification work for JSON Web Proof☆97Updated this week
- library for implementing the server side of the mix network: mixes and providers☆26Updated 2 years ago
- An IETF specification for cryptographic hyperlinking☆15Updated 3 years ago
- katzenpost mix network encrypted messaging client library☆43Updated 2 years ago
- Parse data and test fixtures from markdown files, and patch them programmatically, too.☆25Updated last year
- Yivi app for iOS and Android☆89Updated last week
- Core components common to clients and servers.☆40Updated last year
- WORK ITEM: Authorization Capabilities (ZCAP) specification☆31Updated 2 years ago
- DRAFT: did:web Decentralized Identifier Method Specification☆47Updated 8 months ago
- The DECODE OS for private, distributed P2P computing☆62Updated 3 years ago
- the did:dht method and server implementation☆38Updated 3 weeks ago
- Specs and documentation for all DID-related /.well-known resources☆58Updated 5 months ago
- Key Management System. An implementation of WebKMS in Golang - https://w3c-ccg.github.io/webkms/☆28Updated last year
- Security framework for building multi-user end-to-end encrypted data storage and sharing/processing with zero leakage risks from storage …☆87Updated 3 years ago
- Verifiable Credential Systems☆43Updated last week
- Advanced Data Protection Control (ADPC) is a mechanism to communicate data subjects' (users') consent and privacy decisions with data con…☆48Updated 3 years ago
- Digital Credentials, like driver's licenses☆97Updated last week
- COMMUNITY: Landing site for W3C Credentials Community Group.☆36Updated last year
- Tupelo reference signer implementation☆14Updated 4 years ago
- Hoard is a stateless, deterministically encrypted, content-addressed object store.☆76Updated 2 years ago
- A client for managing Decentralized Identifiers☆43Updated 3 years ago
- Verify that systems operate under your sole control☆14Updated last month
- Key Event Receipt Infrastructure - the spec and implementation of the KERI protocol☆75Updated last year
- Platform software for Trusted Computing - TPM 2.0, Certificate Authority, and Web Services required to perform Local and Remote Attestati…☆11Updated last week
- ☆31Updated last month