基于群签名和群密钥的安全通信系统 Group Communication Security Protocol
☆10Jun 1, 2021Updated 4 years ago
Alternatives and similar repositories for GroupCommu
Users that are interested in GroupCommu are comparing it to the libraries listed below
Sorting:
- 一个基于国密算法的安全文件传输系统,算法库基于GmSSL。☆13Apr 13, 2019Updated 6 years ago
- 基于Python,以CA认证为基础,通过SSL握手协议交换密钥,实现AES加密通信的聊天室☆10Aug 22, 2024Updated last year
- 双向身份认证系统☆10Nov 25, 2021Updated 4 years ago
- This repo contains the PUF and authentication codes for IoT authentication protocol development project☆12Apr 11, 2020Updated 5 years ago
- ☆10May 5, 2021Updated 4 years ago
- Group Signature Camenisch-Lysyanskaya Scheme C++, Pairing-Based Cryptography library☆14Feb 16, 2015Updated 11 years ago
- off-chain computation of zk-snark proofs☆11Jan 7, 2023Updated 3 years ago
- Final Project of Spring 2018 Artificial Intelligence at Tongji Univ.☆12Sep 23, 2018Updated 7 years ago
- Merkle tree·可视化·快速查询·增删·visualization·quick query·add·delete☆12Dec 27, 2021Updated 4 years ago
- Official repository for ODQA experiments from Decomposed Prompting: A Modular Approach for Solving Complex Tasks, ICLR23☆12Jul 28, 2023Updated 2 years ago
- https://github.com/uavorg/uavstack☆10Sep 11, 2017Updated 8 years ago
- This repository will contain code the Zk-Snark for on-chain credit checks☆10Dec 1, 2020Updated 5 years ago
- Efficiently translating MIPS assembly language code to bit or coe code,and vice versa☆14Nov 30, 2023Updated 2 years ago
- Trade Visualization and Execution Web App☆16Feb 8, 2019Updated 7 years ago
- CA系统, 用户UI,用于管理用户和证书☆11Jun 19, 2024Updated last year
- Kubernetes operator for Bagua distributed training job.☆13Feb 7, 2023Updated 3 years ago
- My paper/code reading notes in Chinese☆46Jun 10, 2025Updated 8 months ago
- Lightweight Cryptographic Framework for Internet of Drones☆17Sep 29, 2018Updated 7 years ago
- zero-knowledge proof using zksnarkjs☆10Nov 30, 2022Updated 3 years ago
- An implementation of Maximum Entropy model☆14Apr 28, 2012Updated 13 years ago
- 我在蛋壳公寓的打工记录☆51Mar 23, 2019Updated 6 years ago
- this repository is intended for the purpose of studies related to Blockchain security (specifically to the BIP-39 related wallet algorith…☆10Jul 3, 2022Updated 3 years ago
- Non-Reference IQA implementation in Pytorch CUDA, UCIQE, UIQM, ...☆19May 10, 2023Updated 2 years ago
- 远程桌面控制-局域网-python☆13Jul 25, 2021Updated 4 years ago
- ☆15Aug 21, 2021Updated 4 years ago
- Pytorch Implementation of "UNIST: Unpaired Neural Implicit Shape Translation Network", CVPR 2022☆17Apr 29, 2023Updated 2 years ago
- This program implements the P^2 algorithm as documented in "The P-Square Algorithm for Dynamic Calculation of Percentiles and Histograms …☆25Jun 19, 2019Updated 6 years ago
- 中国计算机设计大赛-人工智能挑战赛-国家二等奖☆18Oct 22, 2022Updated 3 years ago
- Tensorflow Implementation of paper Applying long short-term memory recurrent neural networks to intrusion detection with KDDCup99 Data☆15Nov 14, 2018Updated 7 years ago
- Simulated Annealing for the Multiple Choice Multidimensional Knapsack Problem☆16May 16, 2020Updated 5 years ago
- Journal Article: IEEE Access☆18Oct 23, 2023Updated 2 years ago
- ☆20Oct 19, 2017Updated 8 years ago
- 基于国密算法(SM2+SM3+SM4)实现的安全通信协议加解密☆20May 30, 2021Updated 4 years ago
- ☆25Sep 12, 2019Updated 6 years ago
- ☆17May 14, 2022Updated 3 years ago
- 华中科技大学(HUST)密码系课程报告与学习资料☆23Jan 29, 2024Updated 2 years ago
- Code for the SIGGRAPH 2017 paper "Convolutional Neural Networks on Surfaces via Seamless Toric Covers"☆22Feb 7, 2019Updated 7 years ago
- A Secure file transfer utility & library. The library utilizes SPAKE2 for key negotiation over an insecure channel, and ChaCha20Poly1305 …☆25Oct 14, 2023Updated 2 years ago
- Sea-Thru implementation☆27Dec 22, 2022Updated 3 years ago