-
## Understanding of Library
Firstly, _Let me know if I've missed something_, I've been looking through the repo and grokking through the available demos for managing dids and credentials and from w…
-
After following the instructions for adding the PPA to my local system, I encounter the following message from the output of `apt update`:
```
Err:36 http://ppa.launchpad.net/numix/ppa/ubuntu ja…
-
### Description
Currently it is not possible to verify the authenticity or cryptographic integrity of the downoads from your website or github.com because the releases are not cryptographically sig…
-
```
A serious key discovery specification should have mechanisms for key
rotation and especially revocation. The problems: If a private key is
compromised, you want to be able to at least publish …
-
```
A serious key discovery specification should have mechanisms for key
rotation and especially revocation. The problems: If a private key is
compromised, you want to be able to at least publish …
-
I currently have a use case for needing to sign payloads with an ECDSA private key, and when I try to use it, I get ErrUnsupportedAlgorithm :(.
-
# Description of the new feature/enhancement
Some applications have GPG signatures, these being signed by a developer's key, in order to verify their validity. This is a mostly foolproof me…
-
While using ML-KEM as a DH replacement in (say) TLS or IKE is one important use case, it's not the only one. We should also discuss how ML-KEM might be used as a component within IES, and as authenti…
-
Because signatures (at least in the preferred ed25519 mode) are deterministic products of the key and payload materials, it doesn't seem like there's a use case for more than one signature from the sa…
-
We should clarify whether we expect signatures to be in ASCII or binary format or both should be accepted. Therefore, we need to figure out whether it make a difference for implementers.