变色龙哈希
☆26May 11, 2021Updated 4 years ago
Alternatives and similar repositories for ChameleonHash
Users that are interested in ChameleonHash are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This is the implementation of the policy-based chameleon hash function with black-box accountability PCHBA. We use PCHBA to secure blockc…☆36Nov 14, 2021Updated 4 years ago
- A chameleon hash implementation in GO☆17Jun 3, 2020Updated 5 years ago
- Publicly Accountable Fine-Grained Blockchain Rewriting in Permissionless Setting☆17Feb 22, 2022Updated 4 years ago
- 可编辑区块链,使用基于RSA假设及因数分解的陷门哈希函数替换以太坊geth客户端的keccak256算法并开放出JSON-RPC接口,实现单节点修改指定区块数据、多节点同步修改区块数据的功能。☆17Aug 16, 2020Updated 5 years ago
- Image and text encryption using Shamir's Secret Sharing algorithm☆14Feb 17, 2020Updated 6 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- //基于golang重写区块链//☆12Aug 29, 2018Updated 7 years ago
- source code of DDCTF/*CTF(starctf) challenges made by me☆12Apr 29, 2019Updated 6 years ago
- 基于访问树构造的属性基加密☆65Jul 26, 2022Updated 3 years ago
- sgx-based encrypted deduplication prototype☆14May 14, 2021Updated 4 years ago
- A halfedge mesh data structure for triangulated meshes in Python☆12Mar 30, 2021Updated 4 years ago
- Linkable ring signature library☆25Sep 6, 2023Updated 2 years ago
- Basic implementation of Borromean ring signatures in Python, for learning☆15Dec 14, 2017Updated 8 years ago
- Java project for digital watermarking using DCT-DWT-SVD☆24Mar 25, 2018Updated 8 years ago
- Inspired by the awesome list of awesome lists of awesome lists of...☆20Jan 2, 2019Updated 7 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- In public-key cryptography, the Station-to-Station (STS) protocol is a cryptographic key agreement scheme based on classic Diffie–Hellman…☆11Mar 16, 2016Updated 10 years ago
- Solutions to the security/cryptography problems at https://id0-rsa.pub☆20Apr 5, 2017Updated 8 years ago
- ☆11Oct 7, 2022Updated 3 years ago
- Ring-Signature using secp256k1 in Solidity☆13Jul 6, 2018Updated 7 years ago
- 基于Spring Boot,Spring Cloud(Eureka,Gateway,Ribbon,Feign),Spring Security,JWT,MyBatis、Redis以及区块链技术实现多个token验证登录的大数据网关,大数据网关作为访问控制的节点,集成对用户身…☆12Dec 13, 2022Updated 3 years ago
- Quickly develop Chancode client applications based on SpringData and Hyperledger Fabric Chaincode SDK.☆11Jun 5, 2024Updated last year
- 房链——基于FISCO-BCOS的区块链应用☆13Jun 30, 2020Updated 5 years ago
- Java library for Elliptic Curve Cryptography☆13Aug 20, 2018Updated 7 years ago
- Even though spring security provides role-based access control it doesn’t allow users to perform policy-based authorization. The main goa…☆11Apr 5, 2019Updated 6 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Fabric JDBC connector implements a pure java, type 4 JDBC driver that executes SQL queries on Hyperledger fabric Blockchain.☆18Dec 11, 2018Updated 7 years ago
- This repository includes the codes and files related to the paper titled "An Unsupervised Learning Based Approach for Mining Attribute Ba…☆10Sep 16, 2021Updated 4 years ago
- java sdk demo☆18Mar 20, 2026Updated last week
- 拜占庭算法 PBFT的JAVA版本实现,在PBFT算法实现同时加入了以下几个功能 1、动态加减公式节点 2、发起升级请求 3、数据同步☆10Jun 15, 2022Updated 3 years ago
- PVSS & Scrape in rust☆11Aug 14, 2025Updated 7 months ago
- 🏆 Smart India Hackathon 2019 Winner | Blockchain-powered password manager that upgrades existing auth systems without replacing them☆13Mar 18, 2026Updated last week
- 小组形式完成的C#+Winform+Sql Server 做的人事管理系统,功能基本完成☆11May 31, 2018Updated 7 years ago
- A client side tool for EOS performance testing.☆35Sep 27, 2018Updated 7 years ago
- (Towards) Scalable Threshold Crypto: BLS threshold signatures with millions of signers and a scalable Distributed Key Generation (and VSS…☆34Feb 7, 2024Updated 2 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Rust implementation of Chess using WebSockets☆11May 7, 2016Updated 9 years ago
- Anonymous voting☆18Aug 23, 2022Updated 3 years ago
- This is a proof-of-concept implementation of the framework proposed by [Alves and Aranha 2018] with the purpose of offering a wrapper on …☆23Jan 15, 2018Updated 8 years ago
- SeaCat Auth provides authentication, authorization, identity management, session management and other access control features.☆13Mar 19, 2026Updated last week
- Hyperledger Fabric Spring Boot Starter provides an easy way to get your Spring boot application using Hyperledger Fabric Gateway SDK v2.2…☆16Sep 2, 2020Updated 5 years ago
- A roving tour of some of the various options for Spring Security authentication☆19Oct 18, 2018Updated 7 years ago
- Prediction of PV power and wind power oiutputs(光伏风电出力预测)☆31Jan 20, 2023Updated 3 years ago