ewust / DDoSCoin
A malicious cryptocurrency
☆51Updated 8 years ago
Alternatives and similar repositories for DDoSCoin
Users that are interested in DDoSCoin are comparing it to the libraries listed below
Sorting:
- tunnel traffic through a genuine bittorrent connection☆65Updated 5 years ago
- mixminion is the main implementation of the Type III ("Mixminion") remailer protocol.☆61Updated 12 years ago
- Dr. Y's Ethereum Contract Analyzer☆41Updated 3 years ago
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆28Updated 7 years ago
- A Shadow plug-in that runs the Bitcoin Satoshi reference software☆25Updated 5 years ago
- An android front-end to the zcash wallet through onion services☆13Updated 7 years ago
- An Implementation of the Fully Homomorphic Smart-Vercauteren Cryptosystem☆44Updated 9 years ago
- ☆24Updated 3 years ago
- Experimental High Assurance Cryptographic Library☆20Updated 9 years ago
- A Formal Library as a Bitcoin Spin-Off☆17Updated 7 years ago
- Super Amazing Universal Composability, Yeah!☆34Updated 3 years ago
- Submission site for Zcash Foundation grant proposals☆25Updated 7 years ago
- a C++ embedded domain specific language for zero knowledge proofs☆59Updated 8 years ago
- Modified version of Tor and associated tools for investigating the Hidden Service DHT. This research is old. Lots of work is being done t…☆11Updated 9 years ago
- Deterministic build environment for Zcash☆19Updated last month
- ☆36Updated 6 years ago
- ☆59Updated 3 years ago
- Research and implementation for non-interactive blockchain proofs of proofs of work☆50Updated 2 years ago
- A small program for sending messages via zcash encrypted memo fields☆99Updated 8 years ago
- Work-in-progress Dissent port/rewrite for low-latency anonymous communication☆11Updated 6 years ago
- Proofs of properties of CBC Casper☆35Updated 5 years ago
- ☆10Updated 7 years ago
- Please check out https://github.com/hacspec/hacspec for more information on hacspec☆46Updated 4 years ago
- Supporting materials for our EuroS&P paper: Automated Verification for Secure Messaging Protocols and their Implementations: A Symbolic a…☆36Updated 2 years ago
- A highly performant merkle set data structure. To be ported to C later.☆74Updated 7 years ago
- Technical paper on the Borromean ring signature construction☆47Updated 8 years ago
- Signature scheme submitted to NIST's Post-Quantum Cryptography Project☆28Updated 7 years ago
- http://hackthiscontract.io/☆50Updated 2 years ago
- Zcash Vanity Address Generator☆22Updated 3 years ago
- An authenticated data structure based on a red-black tree.☆54Updated 9 years ago