The scalable, auditable and high-performance tamper-evident log project
☆102Feb 27, 2020Updated 6 years ago
Alternatives and similar repositories for qed
Users that are interested in qed are comparing it to the libraries listed below
Sorting:
- Parasitic Computing Framework☆15Oct 13, 2020Updated 5 years ago
- High-performance, real-time, multi-location data obfuscation tool☆12Mar 6, 2020Updated 5 years ago
- 🚀 Rapid AI-driven prototyping in Python using GPT-3, ChatGPT, and more 🤖. Provide doctests, and let the AI do the rest!☆14Sep 23, 2025Updated 5 months ago
- A Chaos Engineering swiss army knife☆45Nov 1, 2019Updated 6 years ago
- The Security Dependency Orchestrator Service☆87Dec 11, 2020Updated 5 years ago
- 🦀 Rust implementation of sinkhole private information retrieval☆16Apr 16, 2021Updated 4 years ago
- The clever vulnerability dependency finder☆96May 10, 2022Updated 3 years ago
- The monorepo for Meson project☆11May 30, 2024Updated last year
- Realtime backup Redis data to S3☆11May 27, 2020Updated 5 years ago
- PHP long connection proxy, eliminates short links and reduces request latency☆15Oct 4, 2023Updated 2 years ago
- WASMATE, a transformative force, not only empowers developers with efficient WebAssembly runtimes for Web2.0 applications but also propel…☆13Updated this week
- IPC implementation atop CometBFT☆17Jan 11, 2024Updated 2 years ago
- Identity Based Encryption schemes on the BLS12-381 pairing-friendly elliptic curve☆20Aug 31, 2021Updated 4 years ago
- InstaDApp Alternate Dashboard.☆10Sep 23, 2019Updated 6 years ago
- Raft backend implementation using BadgerDB☆120May 17, 2023Updated 2 years ago
- High Speed elliptic curve signature system using a 260-bit Granger Moss Prime.☆14Jun 3, 2021Updated 4 years ago
- Data transformation☆23Apr 18, 2021Updated 4 years ago
- Improves Ubuntu security feed compatibility allowing it to be consumed by Debian vulnerability report tool, debsecan.☆12May 30, 2021Updated 4 years ago
- A trusted AI Model Context Protocol (MCP) runtime for secure, decentralized AI tools and services.☆21Updated this week
- A Rust implementation of the K2Tree, an extremely space-efficient way of representing sparse bit-matrices.☆17Apr 13, 2022Updated 3 years ago
- Launch hacking tests in cloud providers securely, isolated and without raise security alerts in the provider☆16Dec 12, 2017Updated 8 years ago
- Wycheproof for Rust☆20Sep 3, 2025Updated 6 months ago
- VDAF specification☆25Feb 15, 2026Updated 2 weeks ago
- ☆17Feb 3, 2024Updated 2 years ago
- Go package to connect to Ledger devices☆19Aug 22, 2025Updated 6 months ago
- Mini blockchain in Python☆13Mar 7, 2023Updated 2 years ago
- ShamirSecretSharing Rust & Go implementation + WASM lib☆18Oct 10, 2021Updated 4 years ago
- Blind signatures over secp256k1 elliptic curve☆17May 17, 2022Updated 3 years ago
- Go implementation of Merkle Tree Certificates☆24Nov 5, 2025Updated 3 months ago
- Presentations about R1CS☆19May 1, 2019Updated 6 years ago
- Understandable notes on blockchain papers.☆21Feb 19, 2019Updated 7 years ago
- AppCoins is a blockchain-based protocol for the App Economy supported by the Aptoide App Store, and the first ICO serving 200 million us…☆12May 22, 2018Updated 7 years ago
- ☆20Dec 24, 2019Updated 6 years ago
- GooSig: short signatures from RSA that hide the signer's RSA public key☆12Jan 8, 2020Updated 6 years ago
- A privacy-preserving digital version of punch cards used in store loyalty programs☆11Apr 19, 2021Updated 4 years ago
- Decentralized kv storage engine,support decentralized P2P networking, data synchronization and consistency between nodes.☆14Jan 4, 2026Updated last month
- ☆15Sep 19, 2021Updated 4 years ago
- Proof-of-concept implementation of the (V)OPRF protocol in https://datatracker.ietf.org/doc/draft-irtf-cfrg-voprf/☆23Aug 24, 2020Updated 5 years ago
- Libraries and binaries for running witnesses for verifiable logs☆36Updated this week