transparency-dev / armored-witnessLinks
☆27Updated this week
Alternatives and similar repositories for armored-witness
Users that are interested in armored-witness are comparing it to the libraries listed below
Sorting:
- Community Cryptography Test Vectors☆84Updated 5 months ago
- Oblivious HTTP implementation☆31Updated last year
- Compact certificate revocation lists for the WebPKI☆134Updated last week
- Go library for building tile-based transparency logs (tlogs)☆98Updated last week
- A Certificate Transparency log implementation and monitoring API designed for scalability, ease of operation, and reduced cost.☆262Updated 2 weeks ago
- Source Code Transparency☆11Updated 2 years ago
- Go Trusted Execution Environment (TEE)☆136Updated last month
- ☆35Updated this week
- TPM 2.0 TSS keyfile library☆19Updated last month
- ☆24Updated last year
- An Architecture for Trustworthy Digital Supply Chain Transparency Services☆14Updated last week
- Split-Trust Encryption Tool for ubiquitous data encryption.☆39Updated 2 months ago
- PKCS #11 modules in Go without cgo☆92Updated last year
- ☆100Updated 2 weeks ago
- NIST P elliptic curves (re-exported from crypto/internal/nistec)☆50Updated last week
- Generate and verify JWT tokens with Trusted Platform Module (TPM)☆13Updated this week
- An Oblivious HTTP gateway☆70Updated 3 months ago
- An implementation of the Static CT API based on Tessera.☆19Updated last week
- Implementation of draft-irtf-cfrg-hpke☆30Updated 2 years ago
- Go library for deriving age X25519 identities deterministically from keys or passwords.☆33Updated 8 months ago
- Armory Drive - USB encrypted drive with mobile unlock over BLE☆75Updated last month
- PKI Meta-Linter☆97Updated this week
- Go implementation of the Kyber (version 3) post-quantum IND-CCA2 KEM.☆117Updated 10 months ago
- Making transparency normal!☆24Updated last year
- go library for CBOR Object Signing and Encryption (COSE)☆55Updated 6 months ago
- A Go implementation of the quantum-resistant key encapsulation method ML-KEM (formerly known as Kyber).☆155Updated last month
- Upstream for Non Interactive Zero Knowledge CTF platform☆10Updated 5 years ago
- Libraries and binaries for running witnesses for verifiable logs☆29Updated this week
- Go implementation of OPAQUE (RFC 9807), the asymmetric password-authenticated key exchange protocol.☆55Updated this week
- A tool to help you understand TPM commands and responses.☆47Updated 10 months ago