twiss / source-code-transparencyLinks
Source Code Transparency
☆11Updated 2 years ago
Alternatives and similar repositories for source-code-transparency
Users that are interested in source-code-transparency are comparing it to the libraries listed below
Sorting:
- Specifications for Privacy Proxy Implementations☆31Updated this week
- This document describes the Distributed Aggregation Protocol (DAP) being developed by the PPM working group at IETF.☆50Updated last week
- Community Cryptography Test Vectors☆87Updated last week
- Compact certificate revocation lists for the WebPKI☆136Updated 3 weeks ago
- ☆27Updated this week
- VDAF specification☆23Updated this week
- MLS architecture☆74Updated 7 months ago
- A suite of testvectors for X.509 certificate path validation and tools for building them☆54Updated this week
- ☆12Updated 9 months ago
- An Architecture for Trustworthy Digital Supply Chain Transparency Services☆17Updated 3 weeks ago
- Go implementation of Merkle Tree Certificates☆22Updated last week
- Coordination of implementation and interop specific details☆123Updated 6 months ago
- Experimental implementation of the Distributed Aggregation Protocol (DAP) specification.☆63Updated last week
- Mirror of a website on Elligator by Daniel J. Bernstein, Mike Hamburg, Anna Krasnova, and Tanja Lange☆18Updated 7 months ago
- Initial discussions on signatures of WebAssembly modules.☆17Updated 3 years ago
- ☆11Updated 2 years ago
- ☆27Updated last year
- Rust source code for the FrodoPIR Private Information Retrieval scheme.☆68Updated last year
- CONIKS design documents☆16Updated 8 years ago
- ☆10Updated 7 years ago
- Internet-Draft on IP address privacy☆17Updated 7 months ago
- A Prio server implementation.☆71Updated 2 years ago
- A collection of high-performance crypto implementations.☆52Updated last week
- Oblivious HTTP implementation☆31Updated last year
- Libraries and binaries for running witnesses for verifiable logs☆30Updated last week
- Bertie TLS 1.3 Implementation☆126Updated last month
- A user-first approach to threat modeling.☆19Updated 6 months ago
- A tool to help you understand TPM commands and responses.☆47Updated 11 months ago
- ☆82Updated 5 years ago
- Privacy Pass implementation in Rust☆51Updated last week