trevp / double_ratchetLinks
Double Ratchet Algorithm
☆378Updated 9 years ago
Alternatives and similar repositories for double_ratchet
Users that are interested in double_ratchet are comparing it to the libraries listed below
Sorting:
- Noise Specification☆457Updated 6 years ago
- Pond☆913Updated 3 years ago
- Axolotl Protocol Implementation☆421Updated last year
- Provably Anonymous Overlay☆323Updated 10 years ago
- Memory-hard scheme Argon2☆205Updated 4 years ago
- ☆58Updated 8 years ago
- Use OpenPGP-based encryption in Yahoo mail.☆221Updated 8 years ago
- PGP-like encryption + torrent-like addressing + blockchain-like enforcement of data expiry☆122Updated 8 years ago
- Off-the-Record Messaging Protocol version 4. -This is a draft- This repository is a mirror of http://bugs.otr.im/otrv4/otrv4☆189Updated 2 years ago
- A library for off-the-record (deniable authenticated forward secure confidential) multiparty messaging☆405Updated 8 years ago
- Peer-to-peer IPv6 networking, secure and near-zero-conf.☆152Updated 8 years ago
- opmsg message encryption☆753Updated 2 years ago
- OnionBalance provides load-balancing and redundancy for Tor hidden services☆273Updated 5 years ago
- Securely locate peers without central servers☆153Updated 8 years ago
- WARNING: Deprecated! See Privacy Pass☆99Updated 8 years ago
- The DIME resolver library and command line utilities.☆411Updated last year
- ☆89Updated 9 years ago
- A CONIKS implementation in Java☆60Updated 6 years ago
- Reference implementations (software)☆85Updated 8 years ago
- Encrypted peer-to-peer web application platform for decentralized, privacy-preserving applications☆1,148Updated 9 years ago
- TextSecure client package for Go☆128Updated 5 years ago
- axolotl based on libsodium☆22Updated 9 years ago
- serverless, encrypted, NAT-breaking p2p connections - DEPRECATED☆264Updated 5 years ago
- Protected E-mail Headers☆73Updated 5 years ago
- SC4 - Strong Crypto for Mere Mortals☆122Updated 4 years ago
- List of crypto projects that might not suck☆422Updated 2 years ago
- A python implementation of the Axolotl ratchet protocol.☆71Updated 7 years ago
- Tools and ideas to help with PGP keys and fingerprint verification☆58Updated last year
- Distributed, tamper-resistant circumvention tools☆50Updated 9 years ago
- udev helper and rule to identify U2F tokens☆51Updated 7 years ago