TracingWithPrivacy / paperLinks
A privacy preserving contact tracing design to battle infectious diseases
☆28Updated 5 years ago
Alternatives and similar repositories for paper
Users that are interested in paper are comparing it to the libraries listed below
Sorting:
- a Private Publish Subscribe System☆50Updated last year
- Infinitely presentable (aeon) rerandomisable (flux) anonymous credentials.☆28Updated 4 years ago
- The secure messaging summit information☆20Updated 4 years ago
- specification and design documents☆54Updated 2 years ago
- Deterministic And Verifiable Randomness On Schnorr signatures☆13Updated 7 years ago
- katzenpost mix network encrypted messaging client library☆43Updated 2 years ago
- A core and experimental implementation of ClaimChain☆34Updated 6 years ago
- Pure Rust client for YubiHSM2 devices☆70Updated 5 years ago
- a web page / paper☆18Updated 8 years ago
- 🎄🖋 A Rust implementation of Merkle signing☆15Updated 5 years ago
- Public working documents (e.g., Internet drafts)☆23Updated 7 years ago
- Go implementation of rendezvous protocol☆12Updated 2 months ago
- BOLOS community enclave for SGX & simulator☆35Updated 5 years ago
- An EXPERIMENTAL implementation of the CPace PAKE, instantiated with the Ristretto255 group. In Rust☆17Updated 4 years ago
- ☆17Updated 4 months ago
- 3rd party BOLOS SDK for Rust☆23Updated 6 years ago
- Mix Network Bibliography☆15Updated 5 years ago
- Keyname format for public-key fingerprints☆22Updated 11 years ago
- Oblivious Pseudorandom Functions (OPRFs) using Prime-Order Groups☆38Updated 10 months ago
- ☆10Updated 3 years ago
- High Assurance Cryptographic Software☆10Updated 7 months ago
- Privacy Preserving Disease Tracking☆24Updated 5 years ago
- Interoperability tests for libp2p Implementations☆19Updated last week
- This was a pure-Rust implementation of a rangeproof scheme. It is now obsoleted by Bulletproofs.☆16Updated 6 years ago
- Around applying the VDF construcrtion based on isogenies between super-signular elliptic curves☆15Updated 3 years ago
- A user-first approach to threat modeling.☆17Updated 2 months ago
- U2f implementation with threshold signatures☆16Updated 4 years ago
- 🦀 Rust implementation of sinkhole private information retrieval☆16Updated 4 years ago
- libp2p Collaborative Notebook for Research☆37Updated 2 months ago
- a CCA-secure module-lattice-based KEM☆16Updated 6 years ago