ibm-research / ecdaa
Implementation of ECDAA
☆23Updated 7 years ago
Alternatives and similar repositories for ecdaa:
Users that are interested in ecdaa are comparing it to the libraries listed below
- Self-contained educational implementation of the BLISS-B Bimodal Lattice Signature Scheme☆14Updated 8 years ago
- A C implementation of elliptic-curve-based Direct Anonymous Attestation (DAA) signatures. Created to support the Xaptum Edge Network Fabr…☆45Updated 3 years ago
- ☆39Updated 3 years ago
- Stores Chromium Channel ID private keys in an Intel SGX enclave.☆33Updated 8 years ago
- Reference implementation of the BLZZRD variant of the BLISS Ring-LWE Signature Scheme☆15Updated 8 years ago
- The Intel(R) Enhanced Privacy ID Software Development Kit☆30Updated 2 years ago
- Post-quantum cryptography certificates☆58Updated last week
- Optimized implementation of ring-TESLA☆11Updated 8 years ago
- PoC of an SGX enclave performing symmetric reencryption☆50Updated 8 years ago
- Efficient TLS termination inside Intel SGX enclaves for existing applications☆106Updated 2 years ago
- ☆35Updated 7 years ago
- Links to stuff arising from or related to the HACS workshop.☆35Updated 6 years ago
- A python library that implements a number of Privacy Enhancing Technolgies☆132Updated 2 years ago
- SIDH C reference implementation☆13Updated 7 years ago
- Security and Privacy Assurance Research Test and Assessment (SPARTA) tool suite☆37Updated 7 years ago
- ☆57Updated 7 years ago
- Experimental implementation of KEMTLS in Rustls☆29Updated last year
- APRICOT: Advanced Protocols for Real-world Implementation of Computational Oblivious Transfers☆16Updated 8 years ago
- This is a toy implementation in Go of Manger's chosen-ciphertext attack on RSA-OAEP☆31Updated 6 years ago
- Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS☆117Updated 7 years ago
- Proof-of-concept implementation of a cryptographic multilinear maps on the integers☆12Updated 3 years ago
- Python implementations of FIPS 203,204,205 (+ python wrappers for NIST's ACVP-Server crypto code)☆31Updated this week
- Isogeny-based signature using Unruh's construction and the SIDH library☆18Updated 7 years ago
- BRUTUS is an alternative, fast testing framework for CAESAR ciphers.☆22Updated 8 years ago
- Supporting materials for our EuroS&P paper: Automated Verification for Secure Messaging Protocols and their Implementations: A Symbolic a…☆36Updated 2 years ago
- CryptoBib Main Repository for Developers☆18Updated 4 months ago
- Timing Attack on TLS' ECDSA signature☆42Updated 9 years ago
- Reference implementations (software)☆85Updated 8 years ago