ibm-research / ecdaa
Implementation of ECDAA
☆23Updated 7 years ago
Alternatives and similar repositories for ecdaa:
Users that are interested in ecdaa are comparing it to the libraries listed below
- ☆39Updated 3 years ago
- Self-contained educational implementation of the BLISS-B Bimodal Lattice Signature Scheme☆14Updated 8 years ago
- Reference implementation of the BLZZRD variant of the BLISS Ring-LWE Signature Scheme☆15Updated 8 years ago
- C++ Implementation of Multivariate Quadratic FHE☆51Updated 8 years ago
- A C implementation of elliptic-curve-based Direct Anonymous Attestation (DAA) signatures. Created to support the Xaptum Edge Network Fabr…☆45Updated 3 years ago
- Stores Chromium Channel ID private keys in an Intel SGX enclave.☆33Updated 8 years ago
- Libraries for fully homomorphic encryption☆79Updated 8 years ago
- The Intel(R) Enhanced Privacy ID Software Development Kit☆30Updated 2 years ago
- SIDH C reference implementation☆13Updated 8 years ago
- Experiments in high-assurance crypto.☆47Updated 2 years ago
- ☆97Updated 8 years ago
- Applet for testing ecc curves☆25Updated 5 years ago
- Post-quantum cryptography certificates☆58Updated 3 weeks ago
- Docker environment that contains a Database, Monitor, Observatory and Analyzer☆14Updated 3 years ago
- PoC of an SGX enclave performing symmetric reencryption☆49Updated 8 years ago
- ☆49Updated 7 years ago
- Optimized implementation of ring-TESLA☆11Updated 8 years ago
- BRUTUS is an alternative, fast testing framework for CAESAR ciphers.☆22Updated 8 years ago
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆28Updated 6 years ago
- This is a Tamarin model of TLS 1.3☆33Updated last year
- A full-featured implementation of of the LMS and HSS Hash Based Signature Schemes from draft-mcgrew-hash-sigs-07.☆37Updated 2 months ago
- A python library that implements a number of Privacy Enhancing Technolgies☆132Updated 2 years ago
- Emulate a Trusted Execution Environment that is running the GlobalPlaforms Internal API☆46Updated last year
- DEPRECATED – See NOTICE below about migration to new repository – Post-quantum key exchange from the ring learning with errors problem☆59Updated 8 years ago
- A browsable archive of all Underhanded Crypto Contest entries.☆34Updated 5 years ago
- free crypto audit☆31Updated 7 years ago
- Updated! (Dec2-2019) This is a C-language software library that provides optimized implementations of the Diffie-Hellman functions known …☆44Updated last year
- Reference implementations (software)☆85Updated 8 years ago
- An U2F Token implementation based on JavaCard☆15Updated 8 years ago
- PKCS#11 Test Suite☆78Updated last year