BlindDB: an Encrypted, Distributed, and Searchable Key-value Store
☆10Oct 10, 2017Updated 8 years ago
Alternatives and similar repositories for ASIACCS-16
Users that are interested in ASIACCS-16 are comparing it to the libraries listed below
Sorting:
- Linearly Homomorphic Time Lock Puzzle Library☆31Mar 30, 2020Updated 5 years ago
- A proof-of-concept for stateless Bitcoin nodes.☆30Apr 18, 2019Updated 6 years ago
- For all your lunch (automation) needs!☆10May 16, 2019Updated 6 years ago
- Benchmarks of all public available SNARK/STARK keccak circuits☆13Oct 1, 2023Updated 2 years ago
- MIP21 example☆15Jun 20, 2022Updated 3 years ago
- A privacy-preserving digital version of punch cards used in store loyalty programs☆11Apr 19, 2021Updated 4 years ago
- DODO smart contract on EVM☆10Mar 5, 2023Updated 2 years ago
- ☆17Jan 1, 2021Updated 5 years ago
- ☆12Oct 15, 2016Updated 9 years ago
- Download, install, and set up the Double Key Encryption service for Microsoft 365.☆16Jan 27, 2025Updated last year
- ☆10Mar 4, 2024Updated last year
- Accumulators and Vector Commitments☆42Dec 7, 2022Updated 3 years ago
- Models for authenticated key exchange in Tamarin☆12Oct 9, 2019Updated 6 years ago
- EncKV: An Encrypted Key-value Store with Rich Queries☆11Oct 10, 2017Updated 8 years ago
- Perform an arbitrary series of actions in the EVM in a single transaction.☆13Oct 21, 2024Updated last year
- ☆11Mar 8, 2022Updated 3 years ago
- Notify 9 Axis IMU data from M5Stack-Gray with BLE☆12Jun 9, 2019Updated 6 years ago
- Connect a slack team and others☆10Jul 2, 2024Updated last year
- ☆10Aug 8, 2022Updated 3 years ago
- Implementation of the Fish and Begol signature schemes☆14Jul 3, 2017Updated 8 years ago
- [RFC9380] Hash to curves - Go reference implementation☆21Nov 20, 2025Updated 3 months ago
- TAP (Test Anything Protocol) test framework for Crystal☆10Jun 27, 2018Updated 7 years ago
- ☆12Sep 26, 2024Updated last year
- Convex optimization for fun and profit.☆11Jan 12, 2022Updated 4 years ago
- Brand-new anti-social bookmark service☆12Aug 15, 2023Updated 2 years ago
- ☆19Nov 30, 2022Updated 3 years ago
- Solution for the Optimizoor club's sqrt challenge☆11Nov 1, 2022Updated 3 years ago
- Elliptic curve Go reference implementation☆26Feb 5, 2025Updated last year
- The technical paper for the Spark protocol☆11Mar 5, 2024Updated last year
- Misuse cases of Cryptography in real world software products☆12Nov 4, 2018Updated 7 years ago
- Unsafe 3-round MuSig in Python for experimentation☆11Jan 12, 2023Updated 3 years ago
- Verify your NIPoPoWs efficiently, here☆11Dec 8, 2022Updated 3 years ago
- 5Degrees Protocol Core☆11May 7, 2022Updated 3 years ago
- SwiftでWebRTC実装ハンズオンの教材です☆10May 30, 2017Updated 8 years ago
- Provisions: Privacy-preserving proofs of solvency for Bitcoin☆14Jan 10, 2016Updated 10 years ago
- History compaction zkSNARK circuit for Plasma Cash and Cashflow history compaction☆15Mar 20, 2019Updated 6 years ago
- A binding of the physics engine Chipmunk for Julia☆10Sep 26, 2015Updated 10 years ago
- A directive to generate pixel pattern☆10Dec 28, 2015Updated 10 years ago
- Go module for https://github.com/celo-org/bls-zexe/☆13Feb 2, 2024Updated 2 years ago