Parses https://eprint.iacr.org/eprint-bin/search.pl?last=365&title=1 and sends you an email with the latest papers
☆15Nov 11, 2020Updated 5 years ago
Alternatives and similar repositories for eprint-iacr-notifier
Users that are interested in eprint-iacr-notifier are comparing it to the libraries listed below
Sorting:
- Proof-of-concept implementation of the (V)OPRF protocol in https://datatracker.ietf.org/doc/draft-irtf-cfrg-voprf/☆23Aug 24, 2020Updated 5 years ago
- Proof of Device☆20Jan 20, 2023Updated 3 years ago
- [RFC9380] Hash to curves - Rust reference implementation☆27Mar 10, 2024Updated last year
- Pointcheval Sanders signature☆27Jan 16, 2020Updated 6 years ago
- Xoodyak, a lightweight and versatile cryptographic scheme implemented in Rust.☆30Apr 24, 2025Updated 10 months ago
- ☆14May 3, 2019Updated 6 years ago
- ☆12May 7, 2021Updated 4 years ago
- Efficient Anonymous Tokens with Private Metadata Bit☆15Mar 7, 2023Updated 3 years ago
- High Speed elliptic curve signature system using a 260-bit Granger Moss Prime.☆14Jun 3, 2021Updated 4 years ago
- An O(N\log{N}) time algorithm for computing all N proofs fast in the Pointproofs VC. Also, the O(N\log{N}) time Feist-Khovratovich algori…☆13Dec 3, 2020Updated 5 years ago
- a web page / paper☆18Feb 24, 2017Updated 9 years ago
- OPAQUE asymmetric PAKE, and its threshold implementation. Experimental, not audited.☆17Jun 16, 2021Updated 4 years ago
- ABE GPSW scheme using BLS pairing implemented in Rust.☆16May 23, 2023Updated 2 years ago
- ☆18Oct 30, 2023Updated 2 years ago
- Compact linkable ring signatures. A modification on MLSAG.☆19May 10, 2020Updated 5 years ago
- Implementation and simulations for the "Reducing Metadata Leakage from Encrypted Data and Communication with PURBs" paper☆31Oct 26, 2023Updated 2 years ago
- Stronger and Faster Side-Channel Protections for CSIDH☆20Dec 20, 2020Updated 5 years ago
- https://eprint.iacr.org/2020/1516.pdf☆19Jan 2, 2023Updated 3 years ago
- A standard point from which crypto projects may derive their responsible disclosure policy.☆18Apr 27, 2022Updated 3 years ago
- An alternative full node bitcoin implementation written in Go (golang)☆20Jan 24, 2022Updated 4 years ago
- BLST-Verification☆23Jan 22, 2026Updated last month
- Software optimized implementations of GIFT and GIFT-COFB☆18Mar 29, 2022Updated 3 years ago
- ☆19Jul 13, 2020Updated 5 years ago
- AppCoins is a blockchain-based protocol for the App Economy supported by the Aptoide App Store, and the first ICO serving 200 million us…☆12May 22, 2018Updated 7 years ago
- Presentations about R1CS☆19May 1, 2019Updated 6 years ago
- Notary: A Device for Secure Transaction Approval 📟☆28Feb 1, 2025Updated last year
- ☆13Oct 6, 2020Updated 5 years ago
- A privacy-preserving digital version of punch cards used in store loyalty programs☆11Apr 19, 2021Updated 4 years ago
- GooSig: short signatures from RSA that hide the signer's RSA public key☆12Jan 8, 2020Updated 6 years ago
- Website!☆22Sep 20, 2022Updated 3 years ago
- LegoGroth16 implementation on top of Zexe☆25Dec 3, 2021Updated 4 years ago
- Low level arithmetic primitives in RTL☆23Apr 3, 2020Updated 5 years ago
- Hackathon project for Snarky workshop.☆11Jun 21, 2019Updated 6 years ago
- ☆13Feb 23, 2026Updated last week
- ☆10Oct 22, 2019Updated 6 years ago
- wall time exex for reth☆12Aug 5, 2024Updated last year
- Prover for the Plumo light client system https://docs.zkproof.org/pages/standards/accepted-workshop3/proposal-plumo_celolightclient.pdf☆14Jan 4, 2022Updated 4 years ago
- Compact Proofs of Retrievability☆14May 28, 2014Updated 11 years ago
- High Assurance Cryptographic Software☆10Dec 23, 2025Updated 2 months ago