Sample implementations of the attacks shown in https://eprint.iacr.org/2020/1456
☆21Dec 2, 2021Updated 4 years ago
Alternatives and similar repositories for keycommitment
Users that are interested in keycommitment are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆20Dec 13, 2019Updated 6 years ago
- ☆13Oct 7, 2019Updated 6 years ago
- Pickle decompiler plugin for Radare2☆18Aug 6, 2023Updated 2 years ago
- ☆13Mar 3, 2021Updated 5 years ago
- Stronger and Faster Side-Channel Protections for CSIDH☆21Dec 20, 2020Updated 5 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A lecture on quantum computing and symmetric-key cryptography at Chinese Academy of Sciences☆15Nov 19, 2020Updated 5 years ago
- Verify your NIPoPoWs efficiently, here☆11Dec 8, 2022Updated 3 years ago
- ☆19Jul 13, 2020Updated 5 years ago
- Collection of ZKP-related cryptographic primitives☆12Oct 1, 2021Updated 4 years ago
- tar analysis tool☆22Mar 27, 2025Updated last year
- Parses https://eprint.iacr.org/eprint-bin/search.pl?last=365&title=1 and sends you an email with the latest papers☆15Nov 11, 2020Updated 5 years ago
- ☆25Aug 9, 2022Updated 3 years ago
- ☆18Oct 30, 2023Updated 2 years ago
- A tweakable block cipher☆31May 17, 2024Updated last year
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Artifacts for the "Minerva: The curse of ECDSA nonces" paper at CHES 2020☆33Jun 6, 2022Updated 3 years ago
- TLS WG Wiki☆15Jan 16, 2026Updated 2 months ago
- Spoofing signatures in Office Open XML Documents (Word, Excel, Powerpoint)☆26Nov 19, 2022Updated 3 years ago
- A proof-of-concept implementation to evaluate a UTXO-based generalized channel construction in Bitcoin.☆13Dec 13, 2021Updated 4 years ago
- Plasma Paper☆10Sep 13, 2017Updated 8 years ago
- IPython-style interaction for Cryptol☆15Dec 5, 2016Updated 9 years ago
- Resources to break Adoring Poitras from WhibOx contest☆19Apr 13, 2020Updated 5 years ago
- CBOR Information Resources☆13Feb 16, 2026Updated last month
- ☆11Jun 2, 2015Updated 10 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- ☆22Oct 3, 2022Updated 3 years ago
- ☆25Jun 21, 2021Updated 4 years ago
- espresso logic minimizer (https://embedded.eecs.berkeley.edu/pubs/downloads/espresso/index.htm)☆17Oct 29, 2022Updated 3 years ago
- AES-128 and DES differential fault analysis☆16Jan 20, 2021Updated 5 years ago
- Khalil, R. and Gervais, A. 2017. ACM Conference on Computer and Communications Security. Revive: Rebalancing Off-Blockchain Payment Netwo…☆31Aug 29, 2017Updated 8 years ago
- Python interface for Binexport, the Bindiff export format☆22Updated this week
- Intuitive Quantum Computation and Post-Quantum Cryptography☆62Sep 21, 2022Updated 3 years ago
- lnswaps: onchain(BTC, LTC and ETH) to offchain(Lightning) atomic swap☆12Dec 22, 2018Updated 7 years ago
- Implementation of https://eprint.iacr.org/2021/232☆92Mar 5, 2021Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- POC for CVE-2018-15685☆42Aug 24, 2018Updated 7 years ago
- ☆16Jul 10, 2020Updated 5 years ago
- Git mirror of Victor Shoup's NTL library☆14Mar 8, 2016Updated 10 years ago
- Fast constant-time AES implementations on 32-bit architectures☆71Oct 17, 2024Updated last year
- libsnark: a C++ library for zkSNARK proofs [+ interface for jsnark/Pinocchio ]☆11Dec 17, 2022Updated 3 years ago
- Audit Proposals and Reports for RandomX☆12Aug 3, 2019Updated 6 years ago
- ☆35Updated this week