transparency-dev / armored-witness
☆17Updated this week
Related projects ⓘ
Alternatives and complementary repositories for armored-witness
- Community Cryptography Test Vectors☆64Updated 3 weeks ago
- ☆24Updated 2 months ago
- A Certificate Transparency log implementation and monitoring API designed for scalability, ease of operation, and reduced cost.☆126Updated 2 months ago
- A cache hard password hash/KDF☆45Updated 8 months ago
- NIST P elliptic curves (re-exported from crypto/internal/nistec)☆47Updated last year
- TPM 2.0 TSS keyfile library☆11Updated 3 weeks ago
- library providing OPRF and Threshold OPRF based on libsodium☆20Updated last month
- A tool to help you understand TPM commands and responses.☆34Updated 2 months ago
- List of crackpot 'scientists' and 'thinkers'☆14Updated 3 months ago
- An Architecture for Trustworthy Digital Supply Chain Transparency Services☆11Updated this week
- ☆92Updated last month
- Making transparency normal!☆24Updated 11 months ago
- Go Trusted Execution Environment (TEE)☆112Updated 3 weeks ago
- A dead man's switch for full but responsible disclosure of vulnerabilities☆55Updated last month
- Libraries and binaries for running witnesses for verifiable logs☆22Updated this week
- Oblivious HTTP implementation☆24Updated 5 months ago
- Securing open-source package ecosystems by originating, validating, and augmenting build attestations.☆32Updated this week
- Deployments of fancy cryptography☆125Updated 3 weeks ago
- ☆18Updated last year
- A simple, modern and secure encryption tool (and Go library) with small explicit keys, no config options, and UNIX-style composability.☆19Updated last year
- Entity Attestation Token IETF Draft Standard☆18Updated last month
- This document describes the Distributed Aggregation Protocol (DAP) being developed by the PPM working group at IETF.☆46Updated this week
- Exploration of NIST post-quantum signatures on-ramp candidates☆23Updated 2 weeks ago
- Source Code Transparency☆11Updated last year
- Rust source code for the FrodoPIR Private Information Retrieval scheme.☆60Updated 10 months ago
- Tools for power measurements of post-quantum cryptographic algorithms☆26Updated 4 years ago
- Go library for deriving age X25519 identities deterministically from keys or passwords.☆24Updated 2 weeks ago
- Specifications for Privacy Proxy Implementations☆29Updated this week
- ☆22Updated 2 years ago
- A collection of high-performance crypto implementations.☆44Updated 4 months ago