sdiehl / double-ratchetLinks
Double ratchet algorithm for E2E encryption
☆59Updated 6 years ago
Alternatives and similar repositories for double-ratchet
Users that are interested in double-ratchet are comparing it to the libraries listed below
Sorting:
- A functional smart contract system☆6Updated 6 years ago
- A haskell library implementing the Kademlia DHT☆43Updated 6 years ago
- SPAKE2 key exchange protocol for Haskell☆14Updated 2 years ago
- A fast Haskell Bloom filter library.☆60Updated 2 years ago
- A hip inductive theorem prover!☆89Updated 3 years ago
- Implementation of cryptographic primitives using Idris☆122Updated 7 years ago
- Idris to Serpent back end for Ethereum smart contracts☆32Updated 7 years ago
- Shamir Secret Sharing☆21Updated 5 years ago
- Small minimal examples of modern cryptographic techniques in Haskell☆78Updated 5 years ago
- ☆40Updated 7 years ago
- Generate and apply diffs between JSON documents.☆39Updated 2 years ago
- ☆20Updated 6 years ago
- A tool for privacy-preserving identity management (PPIM)☆56Updated 8 years ago
- Type Theory with Indexed Equality☆25Updated 8 years ago
- Run HLint as part of normal compilation☆47Updated 6 years ago
- Distributed systems execution emulation☆18Updated 6 years ago
- Adaptation of the streaming library for increased safety through linear types. Summer of Haskell 2017 project.☆47Updated 7 years ago
- Efficient implementation of the implicit treap data structure☆62Updated 3 years ago
- High level, generic library for interrogative user interfaces in Haskell☆41Updated 4 years ago
- An append only list in a compact region☆25Updated 6 years ago
- Compile Dhall expressions to Cabal files☆101Updated 2 years ago
- Haskell Join-calculus DSL☆24Updated 6 years ago
- haskell memory☆48Updated last year
- The security-centric web platform framework☆52Updated 8 years ago
- More strongly typed variant of the ixset Haskell package☆24Updated 11 months ago
- A library for patches (diffs) on vectors: composable, mergeable and invertible☆56Updated 6 years ago
- JVM implementation in Haskell☆44Updated 9 months ago
- Authenticated Data Structures☆16Updated 10 years ago
- Haskell: Efficiently build a bytestring from smaller chunks☆24Updated 3 years ago
- Thesis☆38Updated 7 years ago