Azure-Samples / DoubleKeyEncryptionServiceLinks
Download, install, and set up the Double Key Encryption service for Microsoft 365.
☆16Updated last year
Alternatives and similar repositories for DoubleKeyEncryptionService
Users that are interested in DoubleKeyEncryptionService are comparing it to the libraries listed below
Sorting:
- A privacy-preserving digital version of punch cards used in store loyalty programs☆11Updated 4 years ago
- a Tahoe-LAFS storage-system plugin which authorizes storage operations based on privacy-respecting tokens☆10Updated 8 months ago
- We implement Delegatable Anonymous Credentials using Mercurial Signatures☆21Updated 3 years ago
- Fast 4 way vectorized ladder for the complete set of Montgomery curves☆11Updated 6 years ago
- Verify your NIPoPoWs efficiently, here☆11Updated 3 years ago
- Dynamic Universal Accumulator with Batch Update over Bilinear Groups☆15Updated 4 years ago
- Provisions: Privacy-preserving proofs of solvency for Bitcoin☆14Updated 10 years ago
- Auditing Applied Cryptography☆11Updated 6 years ago
- Elliptic curve Go reference implementation☆26Updated last year
- ☆10Updated 3 years ago
- Around applying the VDF construcrtion based on isogenies between super-signular elliptic curves☆15Updated 4 years ago
- Wycheproof for Rust☆20Updated 5 months ago
- Stronger and Faster Side-Channel Protections for CSIDH☆20Updated 5 years ago
- ☆18Updated 2 years ago
- An O(N\log{N}) time algorithm for computing all N proofs fast in the Pointproofs VC. Also, the O(N\log{N}) time Feist-Khovratovich algori…☆13Updated 5 years ago
- Small repo for implementing the 2018 EUROCRYPT paper "Simple Proofs of Sequential Work" by Cohen and Pietrzak. Also used as part of our C…☆10Updated 7 years ago
- Ethereum Smart Contracts for Arwen payment channels☆14Updated 3 years ago
- Zero-related bugs in 4 BLS libs & standard draft,"splitting zero" attacks, $35000 award☆17Updated 4 years ago
- Python implementation of the Gram-Schmidt and Lenstra–Lenstra–Lovász lattice basis reduction algorithms☆16Updated 4 years ago
- Solution to harden TLS security by storing private keys and delegating operations to the Trused Execution Environment☆13Updated 3 years ago
- Coconut: Threshold Issuance Selective Disclosure Credentials with Applications to Distributed Ledgers☆14Updated 6 years ago
- Anemoi: a Family of ZK-friendly Arithmetization Oriented Hash Functions☆14Updated 2 years ago
- High Speed elliptic curve signature system using a 260-bit Granger Moss Prime.☆14Updated 4 years ago
- Efficient Anonymous Tokens with Private Metadata Bit☆15Updated 2 years ago
- distributed RSA modulus generation in Rust☆15Updated 3 years ago
- Deterministic And Verifiable Randomness On Schnorr signatures☆13Updated 8 years ago
- ☆23Updated 5 years ago
- Lattice-Based Zero-Knowledge Proofs and Applications: Shorter, Simpler, and More General☆16Updated 3 years ago
- ☆11Updated 3 years ago
- Algorand's reference implementation of bls signature scheme☆14Updated 5 years ago