Security

Cryptographic Primitives

The building blocks. Six battle-tested cryptographic primitives form the foundation of the identity stack. No custom cryptography.

Signatures
Derivation
Hashing
Threshold
Canonical
Transport