变色龙哈希
☆25May 11, 2021Updated 4 years ago
Alternatives and similar repositories for ChameleonHash
Users that are interested in ChameleonHash are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This is the implementation of the policy-based chameleon hash function with black-box accountability PCHBA. We use PCHBA to secure blockc…☆36Nov 14, 2021Updated 4 years ago
- A chameleon hash implementation in GO☆17Jun 3, 2020Updated 5 years ago
- Publicly Accountable Fine-Grained Blockchain Rewriting in Permissionless Setting☆17Feb 22, 2022Updated 4 years ago
- //基于golang重写区块链//☆12Aug 29, 2018Updated 7 years ago
- Membership Inference Attack on Federated Learning☆13Jan 14, 2022Updated 4 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- source code of DDCTF/*CTF(starctf) challenges made by me☆12Apr 29, 2019Updated 7 years ago
- 此项目实现了基于CPABE策略的属性加密、生成密钥、解密以及时间复杂度分析,ABE和RSA的共同加密以及时间复杂度分析。☆12May 24, 2022Updated 3 years ago
- 基于访问树构造的属性基加密☆65Jul 26, 2022Updated 3 years ago
- sgx-based encrypted deduplication prototype☆13May 14, 2021Updated 4 years ago
- Go implementation of Algorand algorithm.☆28Jan 15, 2019Updated 7 years ago
- Basic implementation of Borromean ring signatures in Python, for learning☆17Dec 14, 2017Updated 8 years ago
- Using ZK-SNARK to Implement Decentralized Anonymous Voting on p2p Network☆15Jun 8, 2020Updated 5 years ago
- NILM (Non-intrusive Load Monitoring) 实验代码与结果 本仓库包含使用深度学习模型(LSTM、RNN 和 MultiHead Transformer)进行非侵入式负荷检测的代码和实验结果。NILM 技术用于从总负荷数据中提取各个电器的用电信…☆17Oct 21, 2024Updated last year
- EthereumElders is a library for secure Ethereum smart contract development.It helps you to build custom contracts and more complex decent…☆11May 6, 2021Updated 5 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- In public-key cryptography, the Station-to-Station (STS) protocol is a cryptographic key agreement scheme based on classic Diffie–Hellman…☆12Mar 16, 2016Updated 10 years ago
- 这是一款本人仿照外星人入侵制作的python小游戏,利用了pygame游戏库。跟以前我们在诺基亚手机上玩的坦克大战Java游戏一模一样。☆11Apr 8, 2024Updated 2 years ago
- Federated Learning and Membership Inference Attacks experiments on CIFAR10☆23Jan 29, 2020Updated 6 years ago
- 复现论文《电力系统碳排放流的计算方法初探》。周天睿,康重庆,徐乾耀,等.电力系统碳排放流的计算方法初探[J].电力系统自动化,2012,36(11):44-49.☆21Jul 29, 2025Updated 9 months ago
- ☆11Oct 7, 2022Updated 3 years ago
- Attribute-based Encryption Schemes