☆15Apr 16, 2022Updated 3 years ago
Alternatives and similar repositories for ObliviousMessageRetrieval
Users that are interested in ObliviousMessageRetrieval are comparing it to the libraries listed below
Sorting:
- Schnorr signatures over big curves for Ledger devices. group arithmetic & key derivation for unusual elliptic curves.☆13Apr 9, 2020Updated 5 years ago
- ☆30Aug 10, 2023Updated 2 years ago
- Collection of ZKP-related cryptographic primitives☆12Oct 1, 2021Updated 4 years ago
- A Zero-Knowledge Toolkit☆15Oct 15, 2020Updated 5 years ago
- ☆25Dec 4, 2022Updated 3 years ago
- Zcash Sapling Paper Wallet Generator☆44Mar 13, 2024Updated last year
- Implementation of the Groth16 zk-SNARK proving system☆21Jul 6, 2018Updated 7 years ago
- Implementations of do255e and do255s in C and assembly☆25May 3, 2021Updated 4 years ago
- ☆26Aug 10, 2018Updated 7 years ago
- BLAKE2 AVX2 implementations☆24Dec 22, 2019Updated 6 years ago
- A minimal RedJubjub implementation for use in Zebra.☆30Feb 13, 2026Updated 2 weeks ago
- Sage implementation of the isogeny-and-pairing based VDF☆25Feb 25, 2021Updated 5 years ago
- Signature scheme submitted to NIST's Post-Quantum Cryptography Project☆29Jan 17, 2018Updated 8 years ago
- SQISign: Short Quaternion and Isogeny Signature – C implementation based on PARI/GP (obsolete implementation)☆27Feb 23, 2023Updated 3 years ago
- A Language and Compiler for Homomorphic Encryption Made easY☆68Jun 1, 2020Updated 5 years ago
- lattice-based digital signature scheme qTESLA☆31Nov 9, 2019Updated 6 years ago
- Piano: Extremely Simple, Single-server Private Information Retrieval with Sublinear Server Computation☆34Sep 25, 2024Updated last year
- Tera Uni-App Source☆11May 17, 2019Updated 6 years ago
- An implementation of the append-only log described in the Certificate Transparency specification (RFC 6962)☆38Apr 11, 2025Updated 10 months ago
- Fast, High-Rate Single-Server PIR via FHE Composition☆37May 2, 2022Updated 3 years ago
- MIP21 example☆15Jun 20, 2022Updated 3 years ago
- 基于人工神经网络的中文语义相似度计算研究☆11Apr 1, 2013Updated 12 years ago
- DODO smart contract on EVM☆10Mar 5, 2023Updated 3 years ago
- 本来要自己写个脚本存放poc,发现有大佬已经写了个轮子,使用J2ExpSuite,后期添加POC☆12Feb 17, 2023Updated 3 years ago
- SageMath implementation of the Isogeny-Based PKE FESTA☆10Aug 18, 2023Updated 2 years ago
- A privacy-preserving digital version of punch cards used in store loyalty programs☆11Apr 19, 2021Updated 4 years ago
- Benchmarks of all public available SNARK/STARK keccak circuits☆13Oct 1, 2023Updated 2 years ago
- ☆10Mar 4, 2024Updated 2 years ago
- ☆12Oct 15, 2016Updated 9 years ago
- A Tool for the Static Analysis of Cache Side Channels☆42Mar 5, 2017Updated 9 years ago
- Program for finding low gate count implementations of S-boxes.☆41Oct 22, 2024Updated last year
- Snowshoe - Portable, Secure, Fast Elliptic Curve Math Library in C☆63Feb 3, 2018Updated 8 years ago
- The Squirrel Prover repository. An interactive prover for the formal verification of security protocols.☆59Oct 10, 2025Updated 4 months ago
- The reference implementation of SimplePIR and DoublePIR, accompanying the paper "One Server for the Price of Two: Simple and Fast Single-…☆99Jan 13, 2023Updated 3 years ago
- Naehrig, Niederhagen and Schwabe's pairings code, massaged into a shared library.☆17Apr 19, 2016Updated 9 years ago
- A windows dll call hellper☆14Dec 19, 2014Updated 11 years ago
- zkSNARK full flow example in Go☆12Jun 3, 2020Updated 5 years ago
- Provisions: Privacy-preserving proofs of solvency for Bitcoin☆14Jan 10, 2016Updated 10 years ago
- Comparison of leading error-correcting code implementations☆12Aug 19, 2022Updated 3 years ago