kwonalbert / xrdLinks
XRD: Scalable messaging system with cryptographic privacy.
☆14Updated 5 years ago
Alternatives and similar repositories for xrd
Users that are interested in xrd are comparing it to the libraries listed below
Sorting:
- Notes on cryptographic schemes and attacks☆25Updated 7 years ago
- Code for zero-knowledge middleboxes☆63Updated 3 years ago
- A C++ Implementation of Short Randomizable Signatures (PS Signatures) and EL PASSO (Privacy-preserving, Asynchronous Single Sign-On)☆26Updated 4 years ago
- Go, C++, and C implementation of a bilinear group and pairing-based cryptography for both embedded and non-embedded systems☆38Updated 3 years ago
- Stronger and Faster Side-Channel Protections for CSIDH☆20Updated 5 years ago
- An experimental library for PDP and POR☆31Updated 5 years ago
- Solution to harden TLS security by storing private keys and delegating operations to the Trused Execution Environment☆13Updated 3 years ago
- A Go library for MerkleSquare: A Low-Latency Transparency Log System☆23Updated 4 years ago
- Reference implementations of post-quantum cryptographic primitives☆33Updated 5 months ago
- Designing Secure Cryptography☆22Updated 6 years ago
- Basis Reduction Algorithms for Codes (LLL and more)☆28Updated last year
- Faster Montgomery and Joye ladder formulas for short Weierstrass elliptic curves☆22Updated 5 years ago
- Differential fuzzing for elliptic curves☆24Updated 2 years ago
- SQISign: Short Quaternion and Isogeny Signature – C implementation based on PARI/GP (obsolete implementation)☆27Updated 2 years ago
- ABE GPSW scheme using BLS pairing implemented in Rust.☆16Updated 2 years ago
- Banquet implementation☆14Updated 3 years ago
- EN.601.741: Advanced Topics in Secure and Censorship-Resistant Communications☆15Updated 5 years ago
- Intuitive Quantum Computation and Post-Quantum Cryptography☆63Updated 3 years ago
- Circuits for functions of interest to cryptography☆28Updated 2 years ago
- Implementation and simulations for the "Reducing Metadata Leakage from Encrypted Data and Communication with PURBs" paper☆31Updated 2 years ago
- Tor anonymity network for SGX☆48Updated 6 years ago
- Parses https://eprint.iacr.org/eprint-bin/search.pl?last=365&title=1 and sends you an email with the latest papers☆15Updated 5 years ago
- Auditing Applied Cryptography☆11Updated 6 years ago
- A privacy-preserving digital version of punch cards used in store loyalty programs☆11Updated 4 years ago
- Malicious Two Party Computation Based on Garbled Circuits.☆12Updated 5 years ago
- A tool for linear and differential cryptanalysis of block ciphers written in Rust☆15Updated 3 years ago
- Optimizations for Pairing-Based Cryptography☆17Updated 4 years ago
- [work in progress] Python framework for supporting cryptographic game-hopping proofs☆13Updated 3 years ago
- An implementation of the append-only log described in the Certificate Transparency specification (RFC 6962)☆38Updated 9 months ago
- Formal Analysis of the PQXDH Protocol☆30Updated last year