kwonalbert / xrd
XRD: Scalable messaging system with cryptographic privacy.
☆12Updated 4 years ago
Alternatives and similar repositories for xrd:
Users that are interested in xrd are comparing it to the libraries listed below
- Attacks on Jarvis and Friday☆10Updated 5 years ago
- Code for zero-knowledge middleboxes☆61Updated 2 years ago
- Notes on cryptographic schemes and attacks☆25Updated 6 years ago
- Tor anonymity network for SGX☆46Updated 5 years ago
- Designing Secure Cryptography☆21Updated 5 years ago
- A Go library for MerkleSquare: A Low-Latency Transparency Log System☆21Updated 3 years ago
- Path Oblivious Heap C++ Reference Implementation☆22Updated 5 years ago
- SQISign: Short Quaternion and Isogeny Signature – C implementation based on PARI/GP (obsolete implementation)☆27Updated last year
- Reference implementations of post-quantum cryptographic primitives☆29Updated last year
- Basis Reduction Algorithms for Codes (LLL and more)☆26Updated 11 months ago
- An experimental library for PDP and POR☆29Updated 3 years ago
- Falcon signature and its ZKP extensions☆18Updated 2 years ago
- Implementation of Valiant's universal circuit construction optimized for private function evaluation☆41Updated 4 years ago
- ☆13Updated 3 years ago
- ☆35Updated 7 years ago
- Synced with SGX101 gitbook.☆31Updated last year
- Passive-Swoosh: Practical Lattice-Based Non-Interactive Key Exchange☆27Updated 7 months ago
- [work in progress] Python framework for supporting cryptographic game-hopping proofs☆13Updated 2 years ago
- Stronger and Faster Side-Channel Protections for CSIDH☆19Updated 4 years ago
- Rust implementation of the BMR16 arithmetic garbling scheme.☆34Updated 5 years ago
- ☆22Updated 2 years ago
- CryptOpt: Verified Compilation with Randomized Program Search for Cryptographic Primitives☆58Updated 7 months ago
- An easy-to-use and open-source tool for differential, linear, differential-linear, and integral analysis of S-boxes☆27Updated last month
- ABE GPSW scheme using BLS pairing implemented in Rust.☆15Updated last year
- An implementation of ZKBoo☆33Updated 2 years ago
- Intuitive Quantum Computation and Post-Quantum Cryptography☆62Updated 2 years ago
- Formal Analysis of the PQXDH Protocol☆25Updated 7 months ago
- Performance Evaluation of SHA-256 using SHA New Instructions.☆41Updated 3 years ago
- Building Distributed Enclave Applications with Sancus and SGX☆13Updated 4 years ago
- Implementation of cryptographic primitives in Go☆12Updated last year