kriskwiatkowski / TEE-TLS-delegator
Solution to harden TLS security by storing private keys and delegating operations to the Trused Execution Environment
☆11Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for TEE-TLS-delegator
- Faster Montgomery and Joye ladder formulas for short Weierstrass elliptic curves☆19Updated 4 years ago
- Slides from talks and other materials related to post-quantum crypto☆12Updated 3 years ago
- High Assurance Cryptographic Software☆10Updated 8 months ago
- A privacy-preserving digital version of punch cards used in store loyalty programs☆10Updated 3 years ago
- Couple of "nice" curves at 128-bit and 224-bit security levels☆11Updated 3 years ago
- ABE GPSW scheme using BLS pairing implemented in Rust.☆15Updated last year
- ☆9Updated last year
- High Speed elliptic curve signature system using a 260-bit Granger Moss Prime.☆14Updated 3 years ago
- Wycheproof for Rust☆17Updated 2 months ago
- [work in progress] Python framework for supporting cryptographic game-hopping proofs☆13Updated 2 years ago
- Fast 4 way vectorized ladder for the complete set of Montgomery curves☆10Updated 5 years ago
- An O(N\log{N}) time algorithm for computing all N proofs fast in the Pointproofs VC. Also, the O(N\log{N}) time Feist-Khovratovich algori…☆13Updated 3 years ago
- Efficient Anonymous Tokens with Private Metadata Bit☆13Updated last year
- [RFC9380] Hash to curves - Rust reference implementation☆24Updated 8 months ago
- Anemoi: a Family of ZK-friendly Arithmetization Oriented Hash Functions☆13Updated last year
- Parses https://eprint.iacr.org/eprint-bin/search.pl?last=365&title=1 and sends you an email with the latest papers☆14Updated 4 years ago
- An implementation of a post quantum anonymous credential scheme☆11Updated last year
- Signature schemes from the paper "Signature Schemes and Anonymous Credentials from Bilinear Maps" by Jan Camenisch and Anna Lysyanskaya☆12Updated 3 years ago
- Algorand's reference implementation of bls signature scheme☆13Updated 4 years ago
- Designing Secure Cryptography☆21Updated 5 years ago
- Auditing Applied Cryptography☆10Updated 5 years ago
- Reference implementations of post-quantum cryptographic primitives☆28Updated 10 months ago
- Pixel: Forward secure multi-signatures and threshold signatures☆16Updated 2 years ago
- ☆22Updated 8 years ago
- Implementation of the ZKB++ proof system☆20Updated 5 years ago
- ☆15Updated 5 years ago
- fft impl for ff::Field☆15Updated 6 months ago
- ☆14Updated last month