twiss / source-code-transparencyLinks
Source Code Transparency
☆11Updated 2 years ago
Alternatives and similar repositories for source-code-transparency
Users that are interested in source-code-transparency are comparing it to the libraries listed below
Sorting:
- VDAF specification☆23Updated last week
- Specifications for Privacy Proxy Implementations☆31Updated last week
- Experimental implementation of the Distributed Aggregation Protocol (DAP) specification.☆63Updated last week
- MLS architecture☆74Updated 6 months ago
- A Prio server implementation.☆71Updated 2 years ago
- Community Cryptography Test Vectors☆84Updated 5 months ago
- This document describes the Distributed Aggregation Protocol (DAP) being developed by the PPM working group at IETF.☆50Updated 2 weeks ago
- An Architecture for Trustworthy Digital Supply Chain Transparency Services☆15Updated last week
- Go implementation of Merkle Tree Certificates☆17Updated 6 months ago
- ☆27Updated this week
- Initial discussions on signatures of WebAssembly modules.☆17Updated 3 years ago
- ☆26Updated last year
- Bertie TLS 1.3 Implementation☆125Updated 2 weeks ago
- A suite of testvectors for X.509 certificate path validation and tools for building them☆54Updated this week
- Compact certificate revocation lists for the WebPKI☆135Updated last week
- Libraries and binaries for running witnesses for verifiable logs☆29Updated last week
- Coordination of implementation and interop specific details☆122Updated 6 months ago
- ☆11Updated 2 years ago
- A collection of high-performance crypto implementations.☆52Updated 5 months ago
- Mirror of a website on Elligator by Daniel J. Bernstein, Mike Hamburg, Anna Krasnova, and Tanja Lange☆18Updated 6 months ago
- Hybrid Public Key Encryption☆51Updated last year
- Implementation of Prio in Rust.☆115Updated this week
- A history of PGP-related vulnerabilities☆24Updated 4 years ago
- Reference implementations of post-quantum cryptographic primitives☆32Updated last month
- Making transparency normal!☆24Updated last year
- ☆12Updated 9 months ago
- Internet-Draft on IP address privacy☆17Updated 6 months ago
- XChaCha8Blake3Siv is a nonce-reuse misuse-resistant (NRMR) and key-committing authenticated encryption with associated data (AEAD) algori…☆17Updated 4 years ago
- Oblivious Pseudorandom Functions (OPRFs) using Prime-Order Groups☆38Updated last year
- Verifying constant-time code with symbolic execution☆44Updated 3 years ago