Working Copy of the NSEC5 Specification
☆15Nov 10, 2020Updated 5 years ago
Alternatives and similar repositories for nsec5-draft
Users that are interested in nsec5-draft are comparing it to the libraries listed below
Sorting:
- BLST-Verification☆23Jan 22, 2026Updated last month
- Verification-Driven Development☆21Mar 26, 2021Updated 4 years ago
- Algorand's implementation of pixel consensus signature☆22Apr 7, 2023Updated 2 years ago
- Hashing to Elliptic Curves☆80Sep 8, 2024Updated last year
- Prototype of fraud proofs.☆12Feb 13, 2022Updated 4 years ago
- Hackathon project for Snarky workshop.☆11Jun 21, 2019Updated 6 years ago
- Pastry DHT implementation with a standalone libp2p compatible node☆12Jun 22, 2020Updated 5 years ago
- BLS working standard draft☆39Aug 8, 2019Updated 6 years ago
- Coded Merkle Tree☆26Aug 6, 2019Updated 6 years ago
- Go Ed25519 suitable for use in consensus-critical contexts.☆52Jan 18, 2024Updated 2 years ago
- Parses https://eprint.iacr.org/eprint-bin/search.pl?last=365&title=1 and sends you an email with the latest papers☆15Nov 11, 2020Updated 5 years ago
- Zero-related bugs in 4 BLS libs & standard draft,"splitting zero" attacks, $35000 award☆17Aug 20, 2021Updated 4 years ago
- Algorand's reference implementation of bls signature scheme☆14Sep 7, 2020Updated 5 years ago
- A minimal RedJubjub implementation for use in Zebra.☆30Feb 13, 2026Updated 2 weeks ago
- Sample implementation of NSEC5 cryptography☆23Aug 27, 2018Updated 7 years ago
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆28Apr 20, 2018Updated 7 years ago
- Implementation and simulations for the "Reducing Metadata Leakage from Encrypted Data and Communication with PURBs" paper☆31Oct 26, 2023Updated 2 years ago
- ☆15Sep 28, 2020Updated 5 years ago
- Radicle Developers of All Countries, Unite!☆16Apr 6, 2021Updated 4 years ago
- My Cornell PhD dissertation: Scaling the Infrastructure of Practical Blockchain Systems☆15Sep 10, 2021Updated 4 years ago
- An O(N\log{N}) time algorithm for computing all N proofs fast in the Pointproofs VC. Also, the O(N\log{N}) time Feist-Khovratovich algori…☆13Dec 3, 2020Updated 5 years ago
- Deterministic And Verifiable Randomness On Schnorr signatures☆12Nov 18, 2017Updated 8 years ago
- Where I create DAS Nodes that utilize a Secure Kademlia DHT Discv5 overlay☆16May 5, 2023Updated 2 years ago
- Logging scopes for slog-rs☆14Jan 14, 2026Updated last month
- The web front-end for C++ Patterns.☆16Jul 5, 2021Updated 4 years ago
- geth metrics exporter for Prometheus☆13Jan 21, 2026Updated last month
- [work in progress] Python framework for supporting cryptographic game-hopping proofs☆13Oct 19, 2022Updated 3 years ago
- Threshold Logical Clocks and Que Sera Consensus☆28Jul 27, 2023Updated 2 years ago
- Mix Network Bibliography☆15Feb 6, 2020Updated 6 years ago
- U2f implementation with threshold signatures☆16Nov 24, 2020Updated 5 years ago
- Geolocate your files!☆16Jan 7, 2022Updated 4 years ago
- ABE GPSW scheme using BLS pairing implemented in Rust.☆16May 23, 2023Updated 2 years ago
- OPAQUE asymmetric PAKE, and its threshold implementation. Experimental, not audited.☆17Jun 16, 2021Updated 4 years ago
- a web page / paper☆18Feb 24, 2017Updated 9 years ago
- ☆18Oct 30, 2023Updated 2 years ago
- The anonymous credentials zoo☆16Mar 17, 2021Updated 4 years ago
- ☆19May 5, 2020Updated 5 years ago
- ☆17Mar 17, 2023Updated 2 years ago
- Keyname format for public-key fingerprints☆22Jun 4, 2014Updated 11 years ago