Double Ratchet Algorithm
☆376Mar 30, 2016Updated 9 years ago
Alternatives and similar repositories for double_ratchet
Users that are interested in double_ratchet are comparing it to the libraries listed below
Sorting:
- Axolotl Protocol Implementation☆420Jan 27, 2026Updated last month
- A python implementation of the Axolotl ratchet protocol.☆71Sep 16, 2017Updated 8 years ago
- Pond☆920Dec 17, 2021Updated 4 years ago
- Noise Specification☆461Oct 17, 2018Updated 7 years ago
- TLS Library in python☆237Apr 5, 2022Updated 3 years ago
- A JavaScript implementation of axolotl. Axolotl is a ratcheting forward secrecy protocol.☆75Feb 1, 2016Updated 10 years ago
- An implementation of the axolotl ratchet based on libsodium.☆23Oct 4, 2022Updated 3 years ago
- Rust implementation of Noise☆126May 31, 2017Updated 8 years ago
- Experiments in high-assurance crypto.☆50Dec 15, 2022Updated 3 years ago
- Safe password hashing.☆18Jun 16, 2021Updated 4 years ago
- Keyname format for public-key fingerprints☆22Jun 4, 2014Updated 11 years ago
- ☆30Dec 10, 2021Updated 4 years ago
- materialized view to calculate back-references for unordered log messages☆10Jun 18, 2019Updated 6 years ago
- Models for authenticated key exchange in Tamarin☆12Oct 9, 2019Updated 6 years ago
- ☆10Nov 6, 2018Updated 7 years ago
- Hybrid Public Key Encryption☆51Jul 10, 2024Updated last year
- Gajim plugin for OMEMO Multi-End Message and Object Encryption☆88Nov 28, 2016Updated 9 years ago
- ☆1,416Jul 31, 2020Updated 5 years ago
- Prototype implementation of Prio, a system for the private computation of aggregate statistics.☆64Jan 29, 2018Updated 8 years ago
- [work in progress] Python framework for supporting cryptographic game-hopping proofs☆13Oct 19, 2022Updated 3 years ago
- A secure text messaging application for Android.☆72Dec 25, 2016Updated 9 years ago
- Coordination of implementation and interop specific details☆129Jan 29, 2026Updated last month
- An FS wrapper that keeps all access scoped to a specific folder.☆14Dec 29, 2022Updated 3 years ago
- HTTP Keyserver Protocol (HKP) handlers☆13Apr 25, 2018Updated 7 years ago
- Password encrypted overlay to Random Access modules☆16Apr 5, 2022Updated 3 years ago
- A BibTeX collection on Isogeny-based Cryptography☆18Jan 20, 2023Updated 3 years ago
- An implementation of the Double Ratchet cryptographic ratchet in C++/C☆71Feb 23, 2026Updated last week
- ☆38Mar 20, 2017Updated 8 years ago
- OZ: a sandboxing system targeting everyday workstation applications☆440Apr 18, 2018Updated 7 years ago
- Anonymous peer-to-peer instant messaging☆3,917Dec 30, 2021Updated 4 years ago
- A fork of floodyberry's ed25519-donna modified to support the Ristretto prime-order group☆15Jan 15, 2021Updated 5 years ago
- OPAQUE asymmetric PAKE, and its threshold implementation. Experimental, not audited.☆17Jun 16, 2021Updated 4 years ago
- Supplementary cryptography libraries☆16May 23, 2022Updated 3 years ago
- Simple noise handshake, supporting generic handshake patterns☆18Dec 17, 2025Updated 2 months ago
- Streamable content addressable blob object store that is streams2 and implements the blob store interface☆59Jun 11, 2020Updated 5 years ago
- Pretty Curved Privacy☆122Nov 24, 2025Updated 3 months ago
- Implementations of a fast Elliptic-curve Diffie-Hellman primitive☆343Dec 17, 2021Updated 4 years ago
- SQISign: Short Quaternion and Isogeny Signature – C implementation based on PARI/GP (obsolete implementation)☆27Feb 23, 2023Updated 3 years ago
- An RFC5297-compliant C implementation of AES-SIV☆20Oct 15, 2020Updated 5 years ago