"Threema protocol analysis" paper (including LaTeX sources)
☆18Oct 6, 2016Updated 9 years ago
Alternatives and similar repositories for threema-protocol-analysis
Users that are interested in threema-protocol-analysis are comparing it to the libraries listed below
Sorting:
- A privacy-preserving digital version of punch cards used in store loyalty programs☆11Apr 19, 2021Updated 4 years ago
- ☆12Oct 15, 2016Updated 9 years ago
- A simple kernel module who hides a file by hooking the getdents64 syscall.☆10Aug 27, 2022Updated 3 years ago
- Suffices of German town and village names☆10May 4, 2020Updated 5 years ago
- DODO smart contract on EVM☆10Mar 5, 2023Updated 3 years ago
- MIP21 example☆15Jun 20, 2022Updated 3 years ago
- Benchmarks of all public available SNARK/STARK keccak circuits☆13Oct 1, 2023Updated 2 years ago
- ⚖️ Freier Zugang zu unseren Gesetzen.☆14Jun 16, 2025Updated 8 months ago
- ☆10Mar 4, 2024Updated 2 years ago
- small wiki engine based on static reST files and git for versionning☆25Oct 26, 2015Updated 10 years ago
- The technical paper for the Spark protocol☆11Mar 5, 2024Updated 2 years ago
- Demonstrate the new FileDispositionInfoEx behavior☆15Nov 6, 2017Updated 8 years ago
- Solution for the Optimizoor club's sqrt challenge☆11Nov 1, 2022Updated 3 years ago
- History compaction zkSNARK circuit for Plasma Cash and Cashflow history compaction☆15Mar 20, 2019Updated 6 years ago
- Verify your NIPoPoWs efficiently, here☆11Dec 8, 2022Updated 3 years ago
- Implementation of the Fish and Begol signature schemes☆14Jul 3, 2017Updated 8 years ago
- Customizable charts made with TikZ and LaTeX3☆14Feb 11, 2023Updated 3 years ago
- DUQU MALWARE SOURCE + BINARY + More coming☆12Feb 6, 2023Updated 3 years ago
- Misuse cases of Cryptography in real world software products☆12Nov 4, 2018Updated 7 years ago
- Loads NTDLL, parses the PE file, extracts "Zw" functions, retrieves their System Service Numbers (SSNs), and prints each function’s name,…☆15Apr 21, 2025Updated 10 months ago
- Schnorr signatures over big curves for Ledger devices. group arithmetic & key derivation for unusual elliptic curves.☆13Apr 9, 2020Updated 5 years ago
- Python library for vectorial Boolean functions in cryptography☆11Nov 15, 2023Updated 2 years ago
- ☆15Aug 17, 2023Updated 2 years ago
- Wrapper of the OpenSSL elliptic curve functions for easy Python manipulation☆11Apr 30, 2014Updated 11 years ago
- Convex optimization for fun and profit.☆11Jan 12, 2022Updated 4 years ago
- Intel-Process communitation☆10Feb 27, 2017Updated 9 years ago
- Typst Dateien für Schulmaterial (Mathematik/Informatik)☆16Jun 28, 2024Updated last year
- Models for authenticated key exchange in Tamarin☆12Oct 9, 2019Updated 6 years ago
- Unsafe 3-round MuSig in Python for experimentation☆11Jan 12, 2023Updated 3 years ago
- Implements the Barreto-Naehrig (BN) curve as used by Ethereum☆12May 31, 2019Updated 6 years ago
- Perform an arbitrary series of actions in the EVM in a single transaction.☆13Oct 21, 2024Updated last year
- Go module for https://github.com/celo-org/bls-zexe/☆13Feb 2, 2024Updated 2 years ago
- Provisions: Privacy-preserving proofs of solvency for Bitcoin☆14Jan 10, 2016Updated 10 years ago
- BlindDB: an Encrypted, Distributed, and Searchable Key-value Store☆10Oct 10, 2017Updated 8 years ago
- A tool to generate a freebsd cross compiler (gcc) in linux☆12Feb 20, 2012Updated 14 years ago
- [RFC9380] Hash to curves - Go reference implementation☆21Nov 20, 2025Updated 3 months ago
- ☆10Aug 8, 2022Updated 3 years ago
- ☆12Sep 26, 2024Updated last year
- Vector Commitments with Constant-Sized, Updatable Proofs and Linear-Sized Public Parameters☆11Jun 3, 2021Updated 4 years ago