privacybydesign / irmagoLinks
IRMA server, client, and tooling. Documentation: http://docs.yivi.app/irma-cli
☆82Updated last week
Alternatives and similar repositories for irmago
Users that are interested in irmago are comparing it to the libraries listed below
Sorting:
- Key management is hard☆129Updated 3 years ago
- The DECODE OS for private, distributed P2P computing☆61Updated 3 years ago
- DRAFT: did:web Decentralized Identifier Method Specification☆50Updated last year
- Coordination of implementation and interop specific details☆126Updated this week
- Paper-first Verifiable Credentials Specification using QR Codes.☆63Updated 4 years ago
- Go library for building tile-based transparency logs (tlogs)☆147Updated this week
- An IETF specification for cryptographic hyperlinking☆15Updated 4 years ago
- Specification work for JSON Web Proof☆99Updated 2 months ago
- ☆14Updated 2 years ago
- Extensions and experiments.☆65Updated 2 years ago
- Nitrokey WebSmartCard Specification and Documentation☆32Updated 2 years ago
- Parse data and test fixtures from markdown files, and patch them programmatically, too.☆24Updated 2 years ago
- IRMA app for iOS and Android☆25Updated 5 years ago
- A Go implementation of OPAQUE, a password authenticated key exchange protocol.☆31Updated 7 years ago
- Libraries and binaries for running witnesses for verifiable logs☆35Updated this week
- Security framework for building multi-user end-to-end encrypted data storage and sharing/processing with zero leakage risks from storage …☆86Updated 4 years ago
- Linked Data server for Go☆153Updated 5 years ago
- TextSecure(signal) client package for Go☆58Updated 2 years ago
- ☆61Updated 6 years ago
- Zero knowledge push relay☆33Updated 6 years ago
- Command line program for secret-sharing strings☆80Updated 3 months ago
- Reference implementation of an ActivityPub service using go-ap packages (mirror repository)☆157Updated last week
- User-Controlled Authorization Network (UCAN) tokens in go☆39Updated 3 weeks ago
- SSH Agent for TKey, the flexible open hardware/software USB security key 🔑☆141Updated this week
- Compact certificate revocation lists for the WebPKI☆142Updated this week
- Linked Data Capabilities reference implementation☆28Updated 8 months ago
- Community Cryptography Specification Project☆510Updated 2 weeks ago
- Implementation of the Idemix attribute based credential scheme used in IRMA☆11Updated last year
- Source Code Transparency☆11Updated 2 years ago
- A variant of a Fuzzy Vault cryptographic scheme designed for encrypting data with better human recovery features.☆50Updated 4 years ago