ietf-wg-ppm / draft-ietf-ppm-dap
This document describes the Distributed Aggregation Protocol (DAP) being developed by the PPM working group at IETF.
☆49Updated last week
Alternatives and similar repositories for draft-ietf-ppm-dap
Users that are interested in draft-ietf-ppm-dap are comparing it to the libraries listed below
Sorting:
- VDAF specification☆23Updated this week
- Implementation of Prio in Rust.☆107Updated last week
- Experimental implementation of the Distributed Aggregation Protocol (DAP) specification.☆59Updated this week
- A Prio server implementation.☆71Updated last year
- Agenda/Minutes of Anti-Fraud Community Group meetings.☆19Updated last month
- Hybrid Public Key Encryption☆50Updated 10 months ago
- A raw implementation of Interoperable Private Attribution☆43Updated 2 months ago
- Oblivious Pseudorandom Functions (OPRFs) using Prime-Order Groups☆38Updated 8 months ago
- Specifications for Privacy Proxy Implementations☆30Updated 2 weeks ago
- Source Code Transparency☆11Updated last year
- Pure Rust implementation of HPKE (https://www.rfc-editor.org/rfc/rfc9180.html)☆35Updated 2 weeks ago
- Rust source code for the FrodoPIR Private Information Retrieval scheme.☆67Updated last year
- Javascript implementation of the Ristretto255 group operations, built on top of the popular TweetNaCl.js crypto library☆34Updated last year
- ☆18Updated last year
- Proposal for the addition of Curve25519 and Curve448 to the Web Cryptography API☆47Updated 2 months ago
- Implementation of DAP☆137Updated last month
- ☆56Updated last week
- A place to discuss Private Measurement☆12Updated last year
- An implementation of a verifiable oblivious pseudorandom function (RFC 9497)☆64Updated last week
- Divvi Up Control Plane☆8Updated this week
- The anonymous credentials zoo☆16Updated 4 years ago
- Challenge Bypass using the Ristretto group☆35Updated last week
- MLS architecture☆71Updated last month
- Asynchronous delegated key generation without shared secrets (DRAFT)☆67Updated last year
- Internet-Draft on IP address privacy☆16Updated last month
- Verifying constant-time code with symbolic execution☆44Updated 3 years ago
- A Work Item of the Federated Identity Community Group.☆14Updated 3 weeks ago
- A collection of high-performance crypto implementations.☆51Updated 2 weeks ago
- Community Cryptography Test Vectors☆77Updated 2 weeks ago
- ☆13Updated 3 weeks ago