-
Deadline tuesday midnight..we're gonna have a fun couple of days ...description is as follows
COMUNICATION PROTECTION
Replace TCP connections with TSLS/SSL
TLS requires configuring keys both on the …
JCaet updated
10 years ago
-
Can you please provide a links to scientific articles on searchable encryption topic that you studied and used for CipherSweet creating? What theoretic SSE scheme inspired the most?
-
**Feature request**
Because passwords are so old-school, it would be great to be able to encrypt a CryFS volume using **S/MIME public key(s)** without a password (or with an additional fallback passw…
-
### Pitch
Let every user choose a "secondary" server he wants to be his backup in case that the "primary" server gets closed/dies/whatever.
This involves introducing a mirroring logic of user data…
-
This is a continuation of the issue: https://github.com/GetScatter/ScatterWebExtension/issues/39#
There is two distinct use cases that are important.
- Single account encryption using private ke…
-
This issue is for recording concerns and thoughts based on spike at https://github.com/decentralized-identity/did-common-dotnet/pull/4. Maybe this is a starting point for a discussion and eventually d…
-
### Suggested enhancement
provide a way to use separate allocators for separate types of memory allocation.
for example, add "type" parameter to mbedtls_calloc/free.
### Justification
In my …
-
``` python
import pyaes, base64
from hashlib import md5
mykey="holeaaaaaaaaaaaaaaaaaaaaaaaaaa"
yourkey="holeeaaaaaaaaaaaaaaaaaaaabcaaaa"
class ENCRYPTION:
def __init__(self,key):
self.sa…
-
## Describe the bug
When qubits are allocated and released during a function call in a loop, the reported depth corresponds to a circuit where all function calls occur in parallel, but the reported w…
-
### Suggested enhancement
Support asynchronous implementations for bulk encryption in TLS.
### Justification
Mbed TLS needs this because any embedded systems have hardware accelerators for bu…