riastradh / fidocryptLinks
U2F/FIDO-based key derivation and encapsulation -- C implementation and command-line tool
☆10Updated 2 years ago
Alternatives and similar repositories for fidocrypt
Users that are interested in fidocrypt are comparing it to the libraries listed below
Sorting:
- Abusing U2F to 'store' a stable secret☆16Updated 9 years ago
- A Secure Enclave Token Driver Smartcard Extension☆59Updated 2 years ago
- ☆26Updated this week
- Community Cryptography Test Vectors☆84Updated 4 months ago
- Source Code Transparency☆11Updated last year
- Go Library (and program) to perform pairwise gcd on batches of RSA moduli☆11Updated 10 years ago
- Libraries and binaries for running witnesses for verifiable logs☆29Updated this week
- A suite of testvectors for X.509 certificate path validation and tools for building them☆54Updated this week
- ☆18Updated last year
- A Certificate Transparency log implementation and monitoring API designed for scalability, ease of operation, and reduced cost.☆257Updated last week
- Specifications for Privacy Proxy Implementations☆31Updated this week
- Armory Drive - USB encrypted drive with mobile unlock over BLE☆75Updated 2 weeks ago
- Random tools to perform Certificate Transparency-related stuff. Unmaintained and maybe broken☆27Updated 7 years ago
- An experimental, work-in-progress PAM module for Tailscale☆143Updated 2 years ago
- A tool to help you understand TPM commands and responses.☆46Updated 9 months ago
- Go implementation of Merkle Tree Certificates☆17Updated 4 months ago
- Towards an IETF RFC for XChaCha20-Poly1305☆28Updated 5 years ago
- ☆100Updated 4 months ago
- Compress sets of integers efficiently☆22Updated 4 months ago
- JavaScript XAES-256-GCM implementation using Web Cryptography API☆14Updated last year
- Verify and assert policy on YubiKey attestation certificates☆20Updated 4 months ago
- The anonymous credentials zoo☆16Updated 4 years ago
- `age-plugin-yubikey` implementation, encrypt things with a Yubikey/any PIV card☆25Updated 4 years ago
- SSH Agent for TKey, the flexible open hardware/software USB security key 🔑☆139Updated last month
- ☆11Updated last year
- XChaCha8Blake3Siv is a nonce-reuse misuse-resistant (NRMR) and key-committing authenticated encryption with associated data (AEAD) algori…☆17Updated 4 years ago
- Entity Attestation Token IETF Draft Standard☆19Updated 4 months ago
- Go Trusted Execution Environment (TEE)☆135Updated 2 weeks ago
- ☆33Updated 3 years ago
- Mirror of a website on Elligator by Daniel J. Bernstein, Mike Hamburg, Anna Krasnova, and Tanja Lange☆17Updated 5 months ago