Serenity Documentation
GitHubGitHub (opens in a new tab)
  • Overview
    • Device
  • Questions and remarks for the security audit
    • Introduction
    • User Chain (Devices)
    • User Registration
    • User & Device Authentication
    • User & Device Logout
    • Workspace Chain (Membership & Roles)
    • Workspace Member Devices Proof
    • Workspace Invitation
    • Workspace Key (Encryption)
    • Folder (Encryption & Integrity)
    • Document Chain (Share Links)
    • Document
    • Document Attachments
    • Document Comments
    • Client Server (Authentication & Authorization)
    • Secure Client Storage
    • Miscellaneous
    • Comments
    • Data Sync
    • Resources
    • Threat Model
    • Workspace Signature Chain

On This Page

  • Resources
  • Key derivation
Question? Give us feedback → (opens in a new tab)Edit this page
Archive
Resources

Resources

Key derivation

  • https://libsodium.gitbook.io/doc/key_derivation#deriving-keys-from-a-single-high-entropy-key (opens in a new tab)
  • gocryptfs https://nuetzlich.net/gocryptfs/forward_mode_crypto/ (opens in a new tab)
  • Cryptree https://tik-db.ee.ethz.ch/file/146566189b90f952b8ab1dcf98010781/srds06.pdf (opens in a new tab)
Data SyncThreat Model

Serenity Documentation