kwonalbert / xrd
XRD: Scalable messaging system with cryptographic privacy.
☆13Updated 4 years ago
Alternatives and similar repositories for xrd:
Users that are interested in xrd are comparing it to the libraries listed below
- Code for zero-knowledge middleboxes☆61Updated 2 years ago
- Attacks on Jarvis and Friday☆10Updated 5 years ago
- A Go library for MerkleSquare: A Low-Latency Transparency Log System☆22Updated 3 years ago
- ABE GPSW scheme using BLS pairing implemented in Rust.☆16Updated last year
- Basis Reduction Algorithms for Codes (LLL and more)☆26Updated last year
- Notes on cryptographic schemes and attacks☆25Updated 6 years ago
- Deterministic/nonce-reuse resistant authenticated encryption scheme using XChaCha20, implemented on libsodium.☆29Updated 7 months ago
- EN.601.741: Advanced Topics in Secure and Censorship-Resistant Communications☆15Updated 4 years ago
- Reference implementations of post-quantum cryptographic primitives☆29Updated last year
- Auditing Applied Cryptography☆10Updated 5 years ago
- Differential Address Trace Analysis☆55Updated last year
- A C++ Implementation of Short Randomizable Signatures (PS Signatures) and EL PASSO (Privacy-preserving, Asynchronous Single Sign-On)☆25Updated 3 years ago
- Stronger and Faster Side-Channel Protections for CSIDH☆19Updated 4 years ago
- An implementation of ZKBoo☆33Updated 2 years ago
- Implementation and simulations for the "Reducing Metadata Leakage from Encrypted Data and Communication with PURBs" paper☆30Updated last year
- ☆35Updated 8 years ago
- Fast constant-time AES implementations on 32-bit architectures☆64Updated 5 months ago
- An experimental library for PDP and POR☆29Updated 4 years ago
- ☆28Updated 3 years ago
- BAT KEM/Signature Reference Implementation☆21Updated 3 years ago
- Go, C++, and C implementation of a bilinear group and pairing-based cryptography for both embedded and non-embedded systems☆37Updated 2 years ago
- Results of a recent FOIA for NIST documents related to the design of Dual EC DRBG. Via EFF and Rep. Grayson's office. See README for deta…☆24Updated 10 years ago
- Differential fuzzing for elliptic curves☆23Updated last year
- Performance Evaluation of SHA-256 using SHA New Instructions.☆43Updated 3 years ago
- Designing Secure Cryptography☆21Updated 5 years ago
- An implementation of the append-only log described in the Certificate Transparency specification (RFC 6962)☆35Updated 4 months ago
- Tor anonymity network for SGX☆46Updated 6 years ago
- Building Distributed Enclave Applications with Sancus and SGX☆13Updated 4 years ago
- Scripts for the 'Breaking Rainbow takes a Weekend on a Laptop' paper☆80Updated 2 years ago
- ☆47Updated last year