gdanezis / rousseau-chainLinks
An hash-chain with efficient O(1) append and O(logN) proof.
☆14Updated 7 years ago
Alternatives and similar repositories for rousseau-chain
Users that are interested in rousseau-chain are comparing it to the libraries listed below
Sorting:
- A core and experimental implementation of ClaimChain☆34Updated 7 years ago
- repository for tracking open tasks☆18Updated 7 years ago
- a Private Publish Subscribe System☆50Updated last year
- A python library that implements a number of Privacy Enhancing Technolgies☆135Updated 2 years ago
- Secure multiparty messaging (kindof)☆21Updated 9 years ago
- axolotl based on libsodium☆22Updated 9 years ago
- OPAQUE asymmetric PAKE, and its threshold implementation. Experimental, not audited.☆17Updated 4 years ago
- An implementation for fair auditing and contingent payments in Bitcoin☆23Updated 8 years ago
- Mix Network Bibliography☆15Updated 5 years ago
- Deterministic build environment for Zcash☆19Updated 2 weeks ago
- Public working documents (e.g., Internet drafts)☆23Updated 7 years ago
- APRICOT: Advanced Protocols for Real-world Implementation of Computational Oblivious Transfers☆16Updated 8 years ago
- Python bindings to the Crypto++ library☆50Updated 2 years ago
- ♥ ♥ ♥ Trevor's & Moxie's Axolotl Ratchet + AGL's xmpp-client ♥ ♥ ♥☆12Updated 10 years ago
- Sphinx-based Password Storage low-level library☆129Updated 8 months ago
- ☆58Updated 8 years ago
- a Tahoe-LAFS storage-system plugin which authorizes storage operations based on privacy-respecting tokens☆10Updated 5 months ago
- An implementation of Mike Hamburg's Ed448 (Goldilocks) curve - derived from libdecaf. This is a mirror of https://bugs.otr.im/otrv4/libgo…☆18Updated 5 years ago
- DEPRECATED: A C++ Elligator2 implementation☆15Updated 5 years ago
- SLIP-39 Library based on a fork of Daan Sprenkles' SSS Library for Shamir secret sharing☆14Updated 5 years ago
- PANORAMIX repo☆20Updated 2 years ago
- A password-based implementation of threshold encryption☆32Updated 12 years ago
- C implementation of Elligator 2 for Curve25519☆30Updated 4 years ago
- Proof-of-concept implementation of a cryptographic multilinear maps on the integers☆12Updated 4 years ago
- Regenerable ed25519 keys for OpenSSH and OpenPGP.☆36Updated 5 years ago
- An authenticated data structure based on a red-black tree.☆54Updated 10 years ago
- Deterministic execution virtual machine sandbox for Moxie arch☆78Updated 5 years ago
- Enabling low-bandwidth LibP2P protocols to communicate over LoRa, a low-powered long-range wireless protocol (WIP)☆38Updated 5 years ago
- Authenticated encryption scheme prover/synthesizer☆15Updated 3 years ago
- An Implementation of the Fully Homomorphic Smart-Vercauteren Cryptosystem☆44Updated 10 years ago