Working Copy of the NSEC5 Specification
☆15Nov 10, 2020Updated 5 years ago
Alternatives and similar repositories for nsec5-draft
Users that are interested in nsec5-draft are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Pastry DHT implementation with a standalone libp2p compatible node☆12Jun 22, 2020Updated 5 years ago
- Radicle Developers of All Countries, Unite!☆16Apr 6, 2021Updated 5 years ago
- Verification-Driven Development☆21Mar 26, 2021Updated 5 years ago
- The web front-end for C++ Patterns.☆16Jul 5, 2021Updated 4 years ago
- Zero-related bugs in 4 BLS libs & standard draft,"splitting zero" attacks, $35000 award☆17Aug 20, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- BLST-Verification☆23Jan 22, 2026Updated 2 months ago
- Prototype of fraud proofs.☆12Feb 13, 2022Updated 4 years ago
- Hashing to Elliptic Curves☆80Sep 8, 2024Updated last year
- Go Ed25519 suitable for use in consensus-critical contexts.☆52Jan 18, 2024Updated 2 years ago
- Logging scopes for slog-rs☆14Jan 14, 2026Updated 2 months ago
- Hackathon project for Snarky workshop.☆11Jun 21, 2019Updated 6 years ago
- Coded Merkle Tree☆25Aug 6, 2019Updated 6 years ago
- Parses https://eprint.iacr.org/eprint-bin/search.pl?last=365&title=1 and sends you an email with the latest papers☆15Nov 11, 2020Updated 5 years ago
- Sample implementation of NSEC5 cryptography☆23Aug 27, 2018Updated 7 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Implementation and simulations for the "Reducing Metadata Leakage from Encrypted Data and Communication with PURBs" paper☆30Oct 26, 2023Updated 2 years ago
- Keyname format for public-key fingerprints☆22Jun 4, 2014Updated 11 years ago
- BLS working standard draft☆39Aug 8, 2019Updated 6 years ago
- Algorand's reference implementation of bls signature scheme☆14Sep 7, 2020Updated 5 years ago
- a web page / paper☆18Feb 24, 2017Updated 9 years ago
- Threshold Logical Clocks and Que Sera Consensus☆28Jul 27, 2023Updated 2 years ago
- ☆10Aug 8, 2022Updated 3 years ago
- ABE GPSW scheme using BLS pairing implemented in Rust.☆16May 23, 2023Updated 2 years ago
- Deterministic And Verifiable Randomness On Schnorr signatures☆12Nov 18, 2017Updated 8 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Public working documents (e.g., Internet drafts)☆26Jun 8, 2018Updated 7 years ago
- The Geneva electronic vote system, version 2 (prototype).☆30Jun 5, 2019Updated 6 years ago
- [work in progress] Python framework for supporting cryptographic game-hopping proofs☆13Oct 19, 2022Updated 3 years ago
- ☆15Sep 28, 2020Updated 5 years ago
- 🔑 Command-line wrapper around RustySecrets, a Rust implementation of threshold Shamir's secret sharing.☆10Apr 1, 2018Updated 8 years ago
- A minimal RedJubjub implementation for use in Zebra.☆30Mar 27, 2026Updated 2 weeks ago
- a Javascript wrapper for schnorrkel signatures on Ristretto using WebAssembly.☆15Nov 5, 2019Updated 6 years ago
- research, notes & ideas on various subjects☆65Jan 20, 2022Updated 4 years ago
- This repository is deprecated and is not maintained. Please, use another system for documentation.☆15Aug 31, 2023Updated 2 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Track the state of your webcam, update a ThingSpeak channel, and control lights.☆11Nov 25, 2024Updated last year
- Mix Network Bibliography☆15Feb 6, 2020Updated 6 years ago
- Website for Rust User Group Cologne☆48Mar 25, 2026Updated 2 weeks ago
- UI component library☆18Jan 4, 2023Updated 3 years ago
- OPAQUE asymmetric PAKE, and its threshold implementation. Experimental, not audited.☆17Jun 16, 2021Updated 4 years ago
- ☆19May 5, 2020Updated 5 years ago
- The anonymous credentials zoo☆16Mar 17, 2021Updated 5 years ago