teserakt-io / libe4Links
C library of Teserakt's E4 end-to-end security protocol
☆15Updated 5 years ago
Alternatives and similar repositories for libe4
Users that are interested in libe4 are comparing it to the libraries listed below
Sorting:
- Go library of Teserakt's E4 end-to-end security protocol☆22Updated 5 years ago
- Entity Attestation Token IETF Draft Standard☆19Updated 7 months ago
- Svalbard is a distributed backup system for long-term protection of secret data.☆35Updated 7 years ago
- Security framework for building multi-user end-to-end encrypted data storage and sharing/processing with zero leakage risks from storage …☆85Updated 3 years ago
- Xoodyak, a lightweight and versatile cryptographic scheme implemented in Rust.☆30Updated 7 months ago
- An open key management service to support privacy-first and scalable file sharing.☆48Updated 5 years ago
- Signature scheme submitted to NIST's Post-Quantum Cryptography Project☆74Updated 7 years ago
- Coordination of implementation and interop specific details☆123Updated 7 months ago
- A memory-hard password hashing function.☆71Updated 2 years ago
- A Prio server implementation.☆72Updated 2 years ago
- ipcrypt implementation in C☆33Updated 7 months ago
- Towards an IETF RFC for XChaCha20-Poly1305☆28Updated 5 years ago
- Mirror of http://sourceforge.net/p/ed448goldilocks/code/ci/master/tree/☆33Updated 10 years ago
- A Golang implementation of the AES-FFX Format-Preserving Encryption Scheme☆10Updated 10 years ago
- Reference implementations (software)☆85Updated 9 years ago
- Overlay Network for distributed protocols☆51Updated 2 years ago
- Split-Trust Encryption Tool for ubiquitous data encryption.☆39Updated last week
- Signature scheme submitted to NIST's Post-Quantum Cryptography Project☆29Updated 7 years ago
- Derive Curve25519 encryption keys and ed25519 signing keys from username and password via BLAKE2s hash and scrypt.☆20Updated 9 years ago
- Keysync periodically downloads secrets from Keywhiz☆65Updated 2 years ago
- ☆20Updated 5 years ago
- SpiderMonkey-based Wasm sandbox☆22Updated 5 years ago
- Specifications for Privacy Proxy Implementations☆31Updated 2 weeks ago
- A distributed key-value storage that's tolerant to Byzantine fault.☆30Updated 5 years ago
- The scalable, auditable and high-performance tamper-evident log project☆101Updated 5 years ago
- Repo for DTLS 1.3☆32Updated last month
- Secret sharing library in Java for the Archistar multi-cloud storage system☆47Updated 7 years ago
- cgo wrappers around post-quantum cryptography primitives☆23Updated 6 years ago
- Meta’s Anonymous Credential Service (ACS) is designed to enable it to authenticate users in a “de-identified manner,” permitting access t…☆76Updated last year
- SDK for Keystone Enclave - ABI/SBI libraries and sample apps☆44Updated 3 years ago