Exercises in Privacy Enhancing Technologies (UCL Information Security MSc; Course COMPGA17)
☆40Apr 9, 2020Updated 5 years ago
Alternatives and similar repositories for PET-Exercises
Users that are interested in PET-Exercises are comparing it to the libraries listed below
Sorting:
- A python library that implements a number of Privacy Enhancing Technolgies☆135Oct 26, 2022Updated 3 years ago
- Mirror of freehaven's anonymous research bibliography☆14Feb 10, 2015Updated 11 years ago
- A general-purpose privacy-preserving Analytics platform!☆10Mar 27, 2019Updated 6 years ago
- ☆15Sep 28, 2020Updated 5 years ago
- An O(N\log{N}) time algorithm for computing all N proofs fast in the Pointproofs VC. Also, the O(N\log{N}) time Feist-Khovratovich algori…☆13Dec 3, 2020Updated 5 years ago
- Deterministic And Verifiable Randomness On Schnorr signatures☆12Nov 18, 2017Updated 8 years ago
- Traits and utilities for working with finite fields☆18Aug 15, 2024Updated last year
- Mix Network Bibliography☆15Feb 6, 2020Updated 6 years ago
- a web page / paper☆18Feb 24, 2017Updated 9 years ago
- Capability-based secure key management and credential storage☆120Mar 21, 2013Updated 12 years ago
- Wycheproof for Rust☆20Sep 3, 2025Updated 6 months ago
- ☆19May 5, 2020Updated 5 years ago
- Reference implementation of the BLZZRD variant of the BLISS Ring-LWE Signature Scheme☆17Oct 11, 2016Updated 9 years ago
- ☆20May 21, 2014Updated 11 years ago
- "control-port-filter" without the bash☆14Jun 4, 2016Updated 9 years ago
- Working Copy of the NSEC5 Specification☆15Nov 10, 2020Updated 5 years ago
- A python adapter for CloudFlare's client API☆18Jun 14, 2016Updated 9 years ago
- Puppet DSL 'noop' function. This allows every resource in the containing scope to be set to noop by default.☆18Feb 16, 2024Updated 2 years ago
- ☆20Dec 24, 2019Updated 6 years ago
- CryptoBib Main Repository for Developers☆22Aug 21, 2024Updated last year
- Rust crate for BLS signatures☆32Jul 15, 2024Updated last year
- Off-chain poker in Ethereum☆23Feb 10, 2017Updated 9 years ago
- A Shadow plug-in that runs the Bitcoin Satoshi reference software☆25Feb 20, 2020Updated 6 years ago
- A smart contract to enhance the user experience of the `eth2` deposit contract.☆27Jul 15, 2024Updated last year
- Efficient multi-asset confidential transactions☆34Apr 4, 2019Updated 6 years ago
- Multi-party computation for Zcash's "Sapling" zk-SNARK public parameters☆30Jan 22, 2023Updated 3 years ago
- Coded Merkle Tree☆25Aug 6, 2019Updated 6 years ago
- Parser of X.509 certificates☆43Mar 22, 2016Updated 9 years ago
- A minimal RedJubjub implementation for use in Zebra.☆30Feb 13, 2026Updated 2 weeks ago
- Implementation of various primitives for bellman using CUDA (WIP)☆28Jul 20, 2019Updated 6 years ago
- The Monitoring and Debugging Dashboard (MaDDash) is a tool for collecting large amounts of inherently two-dimensional data and presenting…☆30Sep 26, 2024Updated last year
- Repo for the implementation of the isogeny based signature scheme CSI-FiSh☆25Jun 24, 2023Updated 2 years ago
- Elliptic curve search experiments☆35Mar 6, 2023Updated 2 years ago
- Implementation and simulations for the "Reducing Metadata Leakage from Encrypted Data and Communication with PURBs" paper☆31Oct 26, 2023Updated 2 years ago
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆28Apr 20, 2018Updated 7 years ago
- Threshold Logical Clocks and Que Sera Consensus☆28Jul 27, 2023Updated 2 years ago
- Prosody module that suggest users to enable OTR (not mandatory)☆40Jan 24, 2022Updated 4 years ago
- Implementations of the Coconut signing scheme, cross-compatible between Rust and Go.☆32Jan 5, 2023Updated 3 years ago
- AppCoins is a blockchain-based protocol for the App Economy supported by the Aptoide App Store, and the first ICO serving 200 million us…☆12May 22, 2018Updated 7 years ago