kozyilmaz / biokeyLinks
Cryptographic Key Generation from Biometric Data
☆14Updated 7 years ago
Alternatives and similar repositories for biokey
Users that are interested in biokey are comparing it to the libraries listed below
Sorting:
- Privacy mechanisms for decentralized fingerprint-based authentication☆13Updated 5 years ago
- NTRU Python Library with Application to Encrypted Domain☆31Updated 5 months ago
- ☆36Updated last month
- This repo contains code/learning resources related to Homomorphic Encryption.☆28Updated 6 years ago
- C++ Library for Mobile Private Contact Discovery☆27Updated 4 years ago
- A decentralized privacy-preserving data sharing tool☆31Updated 4 years ago
- An Implementation of the Fully Homomorphic Smart-Vercauteren Cryptosystem☆44Updated 10 years ago
- A variant of a Fuzzy Vault cryptographic scheme designed for encrypting data with better human recovery features.☆50Updated 4 years ago
- ☆26Updated last year
- Key Management System. An implementation of WebKMS in Golang - https://w3c-ccg.github.io/webkms/☆28Updated 2 years ago
- Implementation of algorithms from the paper Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data☆14Updated 11 years ago
- cgo wrappers around post-quantum cryptography primitives☆23Updated 6 years ago
- This provides a library for interacting with the Nitro Secure Module, which provides Nitro Enclaves with attestation capability.☆82Updated 7 months ago
- Minimal encryption/decryption JWE library, secure algs only, browser-compatible.☆14Updated last year
- Package bn256 implements a particular bilinear group.☆128Updated 4 months ago
- Coconut: Threshold Issuance Selective Disclosure Credentials with Applications to Distributed Ledgers.☆66Updated 4 years ago
- A Python implementation of fuzzy extractor.☆62Updated 2 years ago
- MIRACL Core☆230Updated 2 months ago
- Confidential Storage Specification and Implementation☆84Updated 2 years ago
- Reference implementation of the Picnic post-quantum signature scheme☆166Updated 2 years ago
- Verifiable Random Function☆30Updated 5 years ago
- Platform for deploying web-based privacy-preserving data surveys using secure multi-party computation (MPC).☆56Updated last year
- The BBS Signature Scheme☆91Updated 3 months ago
- Decentralized, Secure, Verifiable System for Statistical Queries and Machine Learning on Distributed Datasets☆43Updated 2 years ago
- Tree-based KEM for group key management☆45Updated 7 years ago
- Go library of Teserakt's E4 end-to-end security protocol☆22Updated 5 years ago
- A full-featured implementation of of the LMS and HSS Hash Based Signature Schemes from draft-mcgrew-hash-sigs-07.☆45Updated 2 months ago
- FrodoKEM: Learning with Errors Key Encapsulation. FrodoKEM is a family of key-encapsulation mechanisms that are designed to be conservati…☆151Updated last month
- 🧱⛓️ A scalable decentralized blockchain☆73Updated 4 years ago
- Exploration of NIST post-quantum signatures on-ramp candidates☆36Updated 5 months ago