Implementation and simulations for the "Reducing Metadata Leakage from Encrypted Data and Communication with PURBs" paper
☆31Oct 26, 2023Updated 2 years ago
Alternatives and similar repositories for purb
Users that are interested in purb are comparing it to the libraries listed below
Sorting:
- Deterministic/nonce-reuse resistant authenticated encryption scheme using XChaCha20, implemented on libsodium.☆30Aug 5, 2024Updated last year
- Xoodyak, a lightweight and versatile cryptographic scheme implemented in Rust.☆30Apr 24, 2025Updated 10 months ago
- Proof-of-concept implementation of the (V)OPRF protocol in https://datatracker.ietf.org/doc/draft-irtf-cfrg-voprf/☆23Aug 24, 2020Updated 5 years ago
- Parses https://eprint.iacr.org/eprint-bin/search.pl?last=365&title=1 and sends you an email with the latest papers☆15Nov 11, 2020Updated 5 years ago
- A pure rust implementation of the gimli cipher☆13Jan 26, 2022Updated 4 years ago
- ☆12May 7, 2021Updated 4 years ago
- An O(N\log{N}) time algorithm for computing all N proofs fast in the Pointproofs VC. Also, the O(N\log{N}) time Feist-Khovratovich algori…☆13Dec 3, 2020Updated 5 years ago
- High Speed elliptic curve signature system using a 260-bit Granger Moss Prime.☆14Jun 3, 2021Updated 4 years ago
- Efficient Anonymous Tokens with Private Metadata Bit☆15Mar 7, 2023Updated 2 years ago
- ☆15Sep 28, 2020Updated 5 years ago
- C crypto library☆24Aug 2, 2023Updated 2 years ago
- a web page / paper☆18Feb 24, 2017Updated 9 years ago
- ABE GPSW scheme using BLS pairing implemented in Rust.☆16May 23, 2023Updated 2 years ago
- Hashing to Elliptic Curves☆80Sep 8, 2024Updated last year
- ☆19May 5, 2020Updated 5 years ago
- Proof of Device☆20Jan 20, 2023Updated 3 years ago
- ☆18Oct 30, 2023Updated 2 years ago
- [RFC9380] Hash to curves - Rust reference implementation☆27Mar 10, 2024Updated last year
- A privacy-preserving digital version of punch cards used in store loyalty programs☆11Apr 19, 2021Updated 4 years ago
- A C++ Implementation of Short Randomizable Signatures (PS Signatures) and EL PASSO (Privacy-preserving, Asynchronous Single Sign-On)☆26Jul 8, 2021Updated 4 years ago
- NIST Lightweight Cryptography Primitives☆54Jun 10, 2022Updated 3 years ago
- BLST-Verification☆23Jan 22, 2026Updated last month
- Models for authenticated key exchange in Tamarin☆12Oct 9, 2019Updated 6 years ago
- Verify your NIPoPoWs efficiently, here☆11Dec 8, 2022Updated 3 years ago
- Vector Commitments with Constant-Sized, Updatable Proofs and Linear-Sized Public Parameters☆11Jun 3, 2021Updated 4 years ago
- C implementation of Elligator 2 for Curve25519☆30Jun 26, 2021Updated 4 years ago
- Software optimized implementations of GIFT and GIFT-COFB☆18Mar 29, 2022Updated 3 years ago
- ☆20Dec 24, 2019Updated 6 years ago
- distributed RSA modulus generation in Rust☆15Mar 19, 2022Updated 3 years ago
- Blind RSA signatures for OpenSSL/BoringSSL.☆17Jan 31, 2026Updated last month
- Algorand's reference implementation of bls signature scheme☆14Sep 7, 2020Updated 5 years ago
- Zero-related bugs in 4 BLS libs & standard draft,"splitting zero" attacks, $35000 award☆17Aug 20, 2021Updated 4 years ago
- Code for zero-knowledge middleboxes☆63Jul 26, 2022Updated 3 years ago
- We implement Delegatable Anonymous Credentials using Mercurial Signatures☆21Jun 7, 2022Updated 3 years ago
- Rust implementation of Zcash multi-signautres☆13Jun 23, 2019Updated 6 years ago
- Curated list of rollups on Ethereum and their security guarantees.☆13Feb 3, 2021Updated 5 years ago
- A standalone AES-KW (AES Key Wrap) implementation.☆14Dec 31, 2023Updated 2 years ago
- Implementation of https://www.ietf.org/archive/id/draft-denis-aegis-aead-00.html / https://competitions.cr.yp.to/round3/aegisv11.pdf☆15Mar 25, 2025Updated 11 months ago
- Deterministic And Verifiable Randomness On Schnorr signatures☆12Nov 18, 2017Updated 8 years ago