aniampio / Simulator
Mix network simulator
☆9Updated 3 years ago
Alternatives and similar repositories for Simulator:
Users that are interested in Simulator are comparing it to the libraries listed below
- Pixel: Forward secure multi-signatures and threshold signatures☆16Updated 2 years ago
- A privacy-preserving digital version of punch cards used in store loyalty programs☆10Updated 3 years ago
- [work in progress] Python framework for supporting cryptographic game-hopping proofs☆13Updated 2 years ago
- Signature schemes from the paper "Signature Schemes and Anonymous Credentials from Bilinear Maps" by Jan Camenisch and Anna Lysyanskaya☆12Updated 3 years ago
- Efficient Anonymous Tokens with Private Metadata Bit☆13Updated last year
- Solution to harden TLS security by storing private keys and delegating operations to the Trused Execution Environment☆11Updated 2 years ago
- Python implementation of the HydRand protocol☆18Updated 2 years ago
- ABE GPSW scheme using BLS pairing implemented in Rust.☆15Updated last year
- Code repository for technical papers about selfish mining analysis.☆12Updated last year
- Fast 4 way vectorized ladder for the complete set of Montgomery curves☆10Updated 5 years ago
- Dynamic Universal Accumulator with Batch Update over Bilinear Groups☆12Updated 3 years ago
- A Go library for MerkleSquare: A Low-Latency Transparency Log System☆21Updated 3 years ago
- EN.601.741: Advanced Topics in Secure and Censorship-Resistant Communications☆15Updated 3 years ago
- C implementation of the CLT13 multilinear map☆14Updated 6 years ago
- a Tahoe-LAFS storage-system plugin which authorizes storage operations based on privacy-respecting tokens☆10Updated last month
- Anemoi: a Family of ZK-friendly Arithmetization Oriented Hash Functions☆13Updated last year
- Bitcoin Network Probing Tool☆14Updated 6 years ago
- Verify your NIPoPoWs efficiently, here☆10Updated 2 years ago
- Implementation of the ZKB++ proof system☆20Updated 5 years ago
- Implementation of Valiant's universal circuit construction optimized for private function evaluation☆40Updated 4 years ago
- LaTeX beamer slides for aggregatable subvector commitments (aSVC) talk☆10Updated 4 years ago
- Slides from talks and other materials related to post-quantum crypto☆12Updated 3 years ago
- ☆11Updated 2 years ago
- Passive-Swoosh: Practical Lattice-Based Non-Interactive Key Exchange☆27Updated 7 months ago
- Couple of "nice" curves at 128-bit and 224-bit security levels☆11Updated 3 years ago
- Compact Proofs of Retrievability☆14Updated 10 years ago
- ☆22Updated 8 years ago
- Coded Merkle Tree☆26Updated 5 years ago
- A Python simulator used to model cross shard transaction strategies for Ethereum 2.0☆11Updated 8 months ago
- ☆22Updated last month