twiss / source-code-transparencyLinks
Source Code Transparency
☆11Updated last year
Alternatives and similar repositories for source-code-transparency
Users that are interested in source-code-transparency are comparing it to the libraries listed below
Sorting:
- Experimental implementation of the Distributed Aggregation Protocol (DAP) specification.☆62Updated this week
- Specifications for Privacy Proxy Implementations☆31Updated 3 weeks ago
- VDAF specification☆23Updated this week
- ☆26Updated last week
- ☆24Updated last year
- Mirror of a website on Elligator by Daniel J. Bernstein, Mike Hamburg, Anna Krasnova, and Tanja Lange☆17Updated 4 months ago
- Initial discussions on signatures of WebAssembly modules.☆17Updated 3 years ago
- Coordination of implementation and interop specific details☆122Updated 4 months ago
- WebPKI-level Certificate Revocation via Multi-Level Bloom Filter Cascade☆116Updated 3 weeks ago
- ☆12Updated 7 months ago
- An Architecture for Trustworthy Digital Supply Chain Transparency Services☆13Updated this week
- Community Cryptography Test Vectors☆82Updated 3 months ago
- Bertie TLS 1.3 Implementation☆124Updated 2 months ago
- MLS architecture☆74Updated 4 months ago
- This document describes the Distributed Aggregation Protocol (DAP) being developed by the PPM working group at IETF.☆51Updated this week
- ☆10Updated 6 years ago
- A suite of testvectors for X.509 certificate path validation and tools for building them☆54Updated last week
- Internet-Draft on IP address privacy☆17Updated 4 months ago
- Go implementation of Merkle Tree Certificates☆16Updated 3 months ago
- A Prio server implementation.☆71Updated 2 years ago
- XChaCha8Blake3Siv is a nonce-reuse misuse-resistant (NRMR) and key-committing authenticated encryption with associated data (AEAD) algori…☆17Updated 3 years ago
- Oblivious HTTP implementation☆31Updated last year
- I-D that describes the algorithm identifiers for NIST's PQC ML-DSA for use in the Internet X.509 Public Key Infrastructure☆12Updated 2 weeks ago
- A collection of high-performance crypto implementations.☆53Updated 3 months ago
- A tool to help you understand TPM commands and responses.☆46Updated 8 months ago
- Entity Attestation Token IETF Draft Standard☆19Updated 4 months ago
- The anonymous credentials zoo☆16Updated 4 years ago
- Libraries and binaries for running witnesses for verifiable logs☆28Updated this week
- Generate and verify JWT tokens with Trusted Platform Module (TPM)☆13Updated last week
- Compress sets of integers efficiently☆22Updated 4 months ago