veorq / oeeLinks
One-end encryption, stronger than end-to-end
☆221Updated 2 years ago
Alternatives and similar repositories for oee
Users that are interested in oee are comparing it to the libraries listed below
Sorting:
- Noise Specification☆459Updated 7 years ago
- Off-the-Record Messaging Protocol version 4. -This is a draft- This repository is a mirror of http://bugs.otr.im/otrv4/otrv4☆192Updated 3 years ago
- 🔑 Threshold Shamir's secret sharing in Rust☆271Updated last year
- axolotl based on libsodium☆22Updated 9 years ago
- WARNING: Deprecated! See Privacy Pass☆99Updated 8 years ago
- Signed/Encrypted ARchive: always-encrypted tar-like archive tool with optional signature support☆356Updated 2 years ago
- Memory-hard scheme Argon2☆207Updated 4 years ago
- A party game for nerdy cryptographers. Shamelessly based on Cards Against Humanity.☆323Updated 5 years ago
- Post-quantum cryptography tool (THIS REPOSITORY IS ONLY A MIRROR OF THE MAIN ONE, PLEASE DO NOT FILE BUGS HERE)☆323Updated 3 years ago
- ☆82Updated 5 years ago
- Sphinx-based Password Storage low-level library☆129Updated 10 months ago
- A library for off-the-record (deniable authenticated forward secure confidential) multiparty messaging☆406Updated 8 years ago
- Golang "Post-quantum key exchange – a new hope." (Mirror of https://gitlab.com/yawning/newhope)☆79Updated 6 years ago
- ☆223Updated 7 years ago
- A memory-hard password hashing function.☆71Updated 2 years ago
- Meta-repository for Miscreant: misuse-resistant symmetric encryption library with AES-SIV (RFC 5297) and AES-PMAC-SIV support☆474Updated 6 years ago
- ☆58Updated 8 years ago
- Constant-Time Toolkit☆300Updated 7 years ago
- TLS - what can go wrong?☆108Updated 7 years ago
- free crypto audit☆31Updated 8 years ago
- ☆362Updated 3 years ago
- A public database for software and firmware hashes☆214Updated 9 years ago
- A simple cryptosystem that provides provable plausibly deniable encryption.☆90Updated 6 years ago
- ☆10Updated 7 years ago
- A Rust implementation of the Message Layer Security group messaging protocol☆116Updated 2 years ago
- Call for WPA3 - what's wrong with WPA2 security and how to fix it☆239Updated 8 years ago
- Axolotl Protocol Implementation☆422Updated last year
- Replicating Encrypted PasteBin☆75Updated 8 years ago
- Signature scheme submitted to NIST's Post-Quantum Cryptography Project☆74Updated 8 years ago
- proposal for blinded-token captchas☆26Updated 9 years ago