signalapp / ContactDiscoveryService-IcelakeLinks
☆46Updated 2 weeks ago
Alternatives and similar repositories for ContactDiscoveryService-Icelake
Users that are interested in ContactDiscoveryService-Icelake are comparing it to the libraries listed below
Sorting:
- MLS architecture☆74Updated 9 months ago
- ☆56Updated 2 weeks ago
- Coordination of implementation and interop specific details☆125Updated last month
- This document describes the Distributed Aggregation Protocol (DAP) being developed by the PPM working group at IETF.☆52Updated last week
- The OPAQUE Asymmetric PAKE Protocol☆111Updated 11 months ago
- Hybrid Public Key Encryption☆51Updated last year
- ☆14Updated 8 months ago
- MLS protocol☆241Updated last year
- ☆40Updated 5 years ago
- Pure Rust implementation of HPKE (https://www.rfc-editor.org/rfc/rfc9180.html)☆43Updated 2 weeks ago
- VDAF specification☆25Updated last week
- Implementation of Prio in Rust.☆117Updated this week
- Post-quantum cryptography certificates☆76Updated last month
- Experimental implementation of KEMTLS in Rustls☆33Updated last month
- This software is part of "Supersingular Isogeny Key Encapsulation", a submission to the NIST Post-Quantum Standardization project.☆62Updated 3 years ago
- A Prio server implementation.☆72Updated 2 years ago
- Community Cryptography Test Vectors☆94Updated last week
- ☆281Updated 2 years ago
- ☆43Updated 3 years ago
- Formal Analysis of the PQXDH Protocol☆30Updated last year
- ☆17Updated 4 months ago
- ☆21Updated last week
- The formally verified crypto library for Rust☆188Updated last week
- Rust source code for the FrodoPIR Private Information Retrieval scheme.☆70Updated last year
- Oblivious Pseudorandom Functions (OPRFs) using Prime-Order Groups☆38Updated last year
- Crypto library☆66Updated 3 weeks ago
- SQISign: Short Quaternion and Isogeny Signature – C implementation based on PARI/GP (obsolete implementation)☆27Updated 2 years ago
- The secure messaging summit information☆20Updated 5 years ago
- ☆28Updated 4 years ago
- Tools for power measurements of post-quantum cryptographic algorithms☆30Updated 6 years ago