Distributed Privacy Guard (DKGPG) implements Distributed Key Generation (DKG) and Threshold Cryptography for OpenPGP
☆21Dec 18, 2022Updated 3 years ago
Alternatives and similar repositories for dkgpg
Users that are interested in dkgpg are comparing it to the libraries listed below
Sorting:
- Cryptographic library written in JavaScript. Created at UZH as a part of an E-Voting project.☆14Jan 24, 2023Updated 3 years ago
- Implementation of additive homomorphic ElGamal using the Ristretto group over Curve25519☆22Sep 5, 2022Updated 3 years ago
- Python implementation of MPC threshold signatures☆26Feb 13, 2023Updated 3 years ago
- Two differrent approach to predict Churn customers and finding out important variables that drives churn☆10Oct 19, 2020Updated 5 years ago
- τ²-Bench-Verified is a corrected and verified version of the original τ²-bench benchmark. This release addresses issues discovered in the…☆32Dec 15, 2025Updated 2 months ago
- Minimalistic implementation of a Verifiable (t, n) threshold signature scheme based on elliptic curve with python.☆31Jan 3, 2020Updated 6 years ago
- ☆38Jul 5, 2018Updated 7 years ago
- Pulsar-plot of Strava runs in Swift 3☆12Apr 2, 2018Updated 7 years ago
- Real time replication from MySQL to Neo4J using binary logs☆11Nov 13, 2015Updated 10 years ago
- ClusterTech Parallel Filesystem☆12May 18, 2018Updated 7 years ago
- This project demonstrates how to implement Keycloak authentication in a React application. It is based on the tutorial available at https…☆14Jul 16, 2023Updated 2 years ago
- SQLAlchemy models and DDL and ERD generation from chop-dbhi/data-models style JSON endpoints.☆11May 22, 2023Updated 2 years ago
- A python library for ElGamal-based threshold decryption.☆45Mar 14, 2024Updated last year
- 一个简易的正则表达式引擎!☆10Apr 9, 2017Updated 8 years ago
- [NeurIPS 2025] CodeCrash: Exposing LLM Fragility to Misleading Natural Language in Code Reasoning☆16Jan 24, 2026Updated last month
- Equity Market Reinvented☆10Jan 11, 2023Updated 3 years ago
- The Bitmark Device☆10Oct 13, 2015Updated 10 years ago
- Bring Your Own FIDO2 Extensions!☆16May 13, 2025Updated 9 months ago
- A Platform for Robust Threshold Cryptography based on Asynchronous Publicly Verifiable Secret Sharing with Tunable Security☆98Sep 10, 2022Updated 3 years ago
- Erlang/OTP MTA (Mail Transfer Agent)☆29Jul 8, 2014Updated 11 years ago
- Datalog engine based on DuckDB☆10Mar 8, 2023Updated 2 years ago
- ☆19Jun 8, 2021Updated 4 years ago
- Example UI And TradingView Integration for the Openbook DEX protocol on Solana☆13Mar 24, 2023Updated 2 years ago
- Display speed and realtime stops of the TGV inoui you are in☆11Feb 4, 2024Updated 2 years ago
- Automatic ReLU Reduction☆15Dec 20, 2023Updated 2 years ago
- Quantitative analysis of location reports from Apple's offline finding (OF) location tracking system☆10Apr 20, 2021Updated 4 years ago
- Practical Byzantine Fault Tolerance Consensus and A Simple Distributed Ledger Application☆11Dec 15, 2017Updated 8 years ago
- A synthetic training data generator for a text recognition CNN☆10Jul 8, 2019Updated 6 years ago
- A clone of TED Countdown Timer which can be used offline or hosted in your private space.☆14Dec 22, 2020Updated 5 years ago
- Python 3 wrapper for the mcl library☆12Jan 16, 2026Updated last month
- Code repository for R Data Mining Blueprints, published by Packt☆10Jan 14, 2021Updated 5 years ago
- Multiauth identity server using Node.js and MongoDB.☆16Oct 30, 2018Updated 7 years ago
- Arbitrary precision integers in TensorFlow☆11Dec 27, 2022Updated 3 years ago
- Threat Modelling Assets (STRIDE, DREAD, etc. cheat sheets)☆13Apr 16, 2020Updated 5 years ago
- Codebase for VideoConviction, accepted at KDD 2025 (D&B Track)☆18Jan 22, 2026Updated last month
- A CSS-only, resolution-independent "Fuck me on GitHub" ribbon.☆10Nov 2, 2025Updated 4 months ago
- ☆28Dec 31, 2025Updated 2 months ago
- Security Headers for Kitura☆11Mar 10, 2020Updated 5 years ago
- Proof of concept code for VoteAgain paper☆10Jul 23, 2023Updated 2 years ago