A python library that implements a number of Privacy Enhancing Technolgies
☆135Oct 26, 2022Updated 3 years ago
Alternatives and similar repositories for petlib
Users that are interested in petlib are comparing it to the libraries listed below
Sorting:
- Exercises in Privacy Enhancing Technologies (UCL Information Security MSc; Course COMPGA17)☆40Apr 9, 2020Updated 5 years ago
- A bilinear pairing library for petlib☆39Dec 15, 2022Updated 3 years ago
- Algorand's reference implementation of bls signature scheme☆14Sep 7, 2020Updated 5 years ago
- An hash-chain with efficient O(1) append and O(logN) proof.☆14May 23, 2018Updated 7 years ago
- Proof-of-concept implementation of a cryptographic multilinear maps on the integers☆12Sep 23, 2021Updated 4 years ago
- A general-purpose privacy-preserving Analytics platform!☆10Mar 27, 2019Updated 6 years ago
- Privacy-preserving Tor statistics aggregation tool that implements the secret-sharing variant of the PrivEx algorithm.☆26Sep 21, 2020Updated 5 years ago
- Coconut: Threshold Issuance Selective Disclosure Credentials with Applications to Distributed Ledgers.☆65Jan 19, 2021Updated 5 years ago
- Experimental High Assurance Cryptographic Library☆20Feb 1, 2016Updated 10 years ago
- Public working documents (e.g., Internet drafts)☆26Jun 8, 2018Updated 7 years ago
- Traits and utilities for working with finite fields☆18Aug 15, 2024Updated last year
- Mirror of freehaven's anonymous research bibliography☆14Feb 10, 2015Updated 11 years ago
- Secure multiparty messaging (kindof)☆21Jun 2, 2016Updated 9 years ago
- Hyrax reference implementation: meta-repo with top-level makefile, etc☆36Feb 9, 2018Updated 8 years ago
- Wycheproof for Rust☆20Sep 3, 2025Updated 6 months ago
- Capability-based secure key management and credential storage☆120Mar 21, 2013Updated 12 years ago
- An implementation of a post quantum anonymous credential scheme☆16Dec 18, 2024Updated last year
- A core and experimental implementation of ClaimChain☆34Oct 13, 2018Updated 7 years ago
- PANORAMIX repo☆20Dec 10, 2022Updated 3 years ago
- "control-port-filter" without the bash☆14Jun 4, 2016Updated 9 years ago
- A privacy-preserving digital version of punch cards used in store loyalty programs☆11Apr 19, 2021Updated 4 years ago
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆28Apr 20, 2018Updated 7 years ago
- Models for authenticated key exchange in Tamarin☆12Oct 9, 2019Updated 6 years ago
- Vector Commitments with Constant-Sized, Updatable Proofs and Linear-Sized Public Parameters☆11Jun 3, 2021Updated 4 years ago
- Implementation of the Fish and Begol signature schemes☆14Jul 3, 2017Updated 8 years ago
- ♥ ♥ ♥ Trevor's & Moxie's Axolotl Ratchet + AGL's xmpp-client ♥ ♥ ♥☆12Jan 27, 2015Updated 11 years ago
- Unsafe 3-round MuSig in Python for experimentation☆11Jan 12, 2023Updated 3 years ago
- Multiplication using AVX512 and AVX512IFMA instructions☆23Nov 9, 2015Updated 10 years ago
- Implementation of the BLS12-381 pairing-friendly elliptic curve group with extra features needed by the Dusk-Network team☆23Feb 2, 2026Updated last month
- Solution to harden TLS security by storing private keys and delegating operations to the Trused Execution Environment☆13Oct 10, 2022Updated 3 years ago
- ☆12May 7, 2021Updated 4 years ago
- A memory-hard password hashing function.☆71May 29, 2023Updated 2 years ago
- Charm: A Framework for Rapidly Prototyping Cryptosystems☆630Feb 8, 2026Updated 3 weeks ago
- Files of IRTF HRPC research group☆19Nov 26, 2018Updated 7 years ago
- Rust Tor Controller library☆24Apr 19, 2020Updated 5 years ago
- Golang "Post-quantum key exchange – a new hope." (Mirror of https://gitlab.com/yawning/newhope)☆79Sep 2, 2019Updated 6 years ago
- ☆15Sep 28, 2020Updated 5 years ago
- Efficient Anonymous Tokens with Private Metadata Bit☆15Mar 7, 2023Updated 2 years ago
- Identity Based Encryption schemes on the BLS12-381 pairing-friendly elliptic curve☆20Aug 31, 2021Updated 4 years ago