twiss / source-code-transparencyLinks
Source Code Transparency
☆11Updated last year
Alternatives and similar repositories for source-code-transparency
Users that are interested in source-code-transparency are comparing it to the libraries listed below
Sorting:
- Mirror of a website on Elligator by Daniel J. Bernstein, Mike Hamburg, Anna Krasnova, and Tanja Lange☆17Updated 5 months ago
- Specifications for Privacy Proxy Implementations☆31Updated this week
- VDAF specification☆23Updated this week
- This document describes the Distributed Aggregation Protocol (DAP) being developed by the PPM working group at IETF.☆50Updated last week
- MLS architecture☆74Updated 5 months ago
- ☆26Updated this week
- Coordination of implementation and interop specific details☆122Updated 4 months ago
- Experimental implementation of the Distributed Aggregation Protocol (DAP) specification.☆63Updated last week
- An Architecture for Trustworthy Digital Supply Chain Transparency Services☆13Updated last week
- Go implementation of Merkle Tree Certificates☆17Updated 4 months ago
- Community Cryptography Test Vectors☆84Updated 4 months ago
- Initial discussions on signatures of WebAssembly modules.☆17Updated 3 years ago
- WebPKI-level Certificate Revocation via Multi-Level Bloom Filter Cascade☆129Updated 3 weeks ago
- ☆10Updated 6 years ago
- ☆11Updated 2 years ago
- ☆12Updated 7 months ago
- CONIKS design documents☆16Updated 8 years ago
- A user-first approach to threat modeling.☆18Updated 4 months ago
- A suite of testvectors for X.509 certificate path validation and tools for building them☆54Updated this week
- Bertie TLS 1.3 Implementation☆125Updated 3 months ago
- Rust source code for the FrodoPIR Private Information Retrieval scheme.☆67Updated last year
- ☆24Updated last year
- Oblivious HTTP implementation☆31Updated last year
- OPAQUE protocol, a secure asymmetric password authenticated key exchange (aPAKE) that supports mutual authentication in a client-server s…☆80Updated 4 years ago
- U2F/FIDO-based key derivation and encapsulation -- C implementation and command-line tool☆10Updated 2 years ago
- The anonymous credentials zoo☆16Updated 4 years ago
- A Prio server implementation.☆71Updated 2 years ago
- A collection of high-performance crypto implementations.☆52Updated 4 months ago
- Compress sets of integers efficiently☆22Updated 4 months ago
- Entity Attestation Token IETF Draft Standard☆19Updated 4 months ago