transparency-dev / armored-witnessLinks
☆28Updated this week
Alternatives and similar repositories for armored-witness
Users that are interested in armored-witness are comparing it to the libraries listed below
Sorting:
- Oblivious HTTP implementation☆32Updated last year
- Libraries and binaries for running witnesses for verifiable logs☆33Updated last week
- Community Cryptography Test Vectors☆88Updated last month
- An Architecture for Trustworthy Digital Supply Chain Transparency Services☆17Updated last month
- Compact certificate revocation lists for the WebPKI☆137Updated last month
- A Certificate Transparency log implementation and monitoring API designed for scalability, ease of operation, and reduced cost.☆269Updated last week
- An implementation of a static-ct-api certificate transparency log for deployment on Cloudflare Workers☆36Updated this week
- Go library for building tile-based transparency logs (tlogs)☆122Updated last week
- ☆36Updated this week
- ☆25Updated last year
- Split-Trust Encryption Tool for ubiquitous data encryption.☆39Updated this week
- Source Code Transparency☆11Updated 2 years ago
- An implementation of the Static CT API based on Tessera.☆24Updated last week
- TPM 2.0 TSS keyfile library☆19Updated 3 months ago
- Generate and verify JWT tokens with Trusted Platform Module (TPM)☆13Updated 2 months ago
- Go Trusted Execution Environment (TEE)☆140Updated 3 months ago
- Making transparency normal!☆24Updated last year
- Implementation of draft-irtf-cfrg-hpke☆30Updated 2 years ago
- Go implementation of Merkle Tree Certificates☆22Updated last month
- PKCS #11 modules in Go without cgo☆95Updated last year
- I-D that describes the algorithm identifiers for NIST's PQC ML-DSA for use in the Internet X.509 Public Key Infrastructure☆14Updated last month
- ☆99Updated 2 months ago
- PQC Transition Tools Index☆35Updated last month
- A tool to help you understand TPM commands and responses.☆47Updated last year
- Attestation verification services based on Veraison components☆38Updated last week
- NIST P elliptic curves (re-exported from crypto/internal/nistec)☆51Updated last month
- Armory Drive - USB encrypted drive with mobile unlock over BLE☆77Updated 3 months ago
- Go library for deriving age X25519 identities deterministically from keys or passwords.☆33Updated 10 months ago
- Formal specification of attestation mechanisms in Confidential Computing☆24Updated 2 weeks ago
- An Oblivious HTTP gateway☆73Updated 2 weeks ago