aniampio / SimulatorLinks
Mix network simulator
☆10Updated 3 years ago
Alternatives and similar repositories for Simulator
Users that are interested in Simulator are comparing it to the libraries listed below
Sorting:
- Compact Proofs of Retrievability☆14Updated 11 years ago
- My Cornell PhD dissertation: Scaling the Infrastructure of Practical Blockchain Systems☆15Updated 3 years ago
- Python implementation of the HydRand protocol☆18Updated 2 years ago
- Provisions: Privacy-preserving proofs of solvency for Bitcoin☆14Updated 9 years ago
- EN.601.741: Advanced Topics in Secure and Censorship-Resistant Communications☆15Updated 4 years ago
- Signature schemes from the paper "Signature Schemes and Anonymous Credentials from Bilinear Maps" by Jan Camenisch and Anna Lysyanskaya☆12Updated 3 years ago
- Hackathon project for Snarky workshop.☆11Updated 6 years ago
- In this repository I simulate the work of the recently proposed Dynamic Market Maker, which proposes dynamic variations in the determinat…☆9Updated 4 years ago
- Verify your NIPoPoWs efficiently, here☆11Updated 2 years ago
- Pixel: Forward secure multi-signatures and threshold signatures☆17Updated 3 years ago
- A Python tool to manage and tag your bibliography (.bib and .pdf) files on Dropbox☆13Updated 2 years ago
- Solution to harden TLS security by storing private keys and delegating operations to the Trused Execution Environment☆12Updated 2 years ago
- ☆11Updated 2 years ago
- Batch verifier for zkSNARKs☆10Updated 2 years ago
- The modular protocol framework based on Universal Composability☆18Updated 5 years ago
- PVSS & Scrape in rust☆11Updated last year
- Coded Merkle Tree☆26Updated 5 years ago
- Public repository for Blockchains and Cryptocurrencies (601.641/601.441) JHU (Fall 2020)☆58Updated 4 years ago
- ☆22Updated 3 years ago
- Anemoi: a Family of ZK-friendly Arithmetization Oriented Hash Functions☆13Updated 2 years ago
- a Tahoe-LAFS storage-system plugin which authorizes storage operations based on privacy-respecting tokens☆10Updated 2 months ago
- A privacy-preserving digital version of punch cards used in store loyalty programs☆11Updated 4 years ago
- ☆22Updated 8 years ago
- ☆15Updated 6 years ago
- Super Amazing Universal Composability, Yeah!☆34Updated 3 years ago
- An implementation of the Groth-Sahai NIZK protocol☆14Updated 8 years ago
- We implement Delegatable Anonymous Credentials using Mercurial Signatures☆21Updated 3 years ago
- PCT-TEE: Private Contact Tracing with Trusted Execution Environment☆9Updated 2 years ago
- Algorand's reference implementation of bls signature scheme☆14Updated 4 years ago
- [work in progress] Python framework for supporting cryptographic game-hopping proofs☆13Updated 2 years ago