Misuse cases of Cryptography in real world software products
☆12Nov 4, 2018Updated 7 years ago
Alternatives and similar repositories for cryptoMisuse
Users that are interested in cryptoMisuse are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A privacy-preserving digital version of punch cards used in store loyalty programs☆11Apr 19, 2021Updated 4 years ago
- ☆15May 27, 2021Updated 4 years ago
- ABE GPSW scheme using BLS pairing implemented in Rust.☆16May 23, 2023Updated 2 years ago
- Wycheproof for Rust☆20Sep 3, 2025Updated 6 months ago
- Vector Commitments with Constant-Sized, Updatable Proofs and Linear-Sized Public Parameters☆11Jun 3, 2021Updated 4 years ago
- Anemoi: a Family of ZK-friendly Arithmetization Oriented Hash Functions☆14Jul 9, 2023Updated 2 years ago
- Pointcheval Sanders signature☆27Mar 16, 2026Updated last week
- A White-Box Masking Scheme Against Computational and Algebraic Attacks☆13Jan 6, 2021Updated 5 years ago
- Globetrotters NFT is a randomly generated dynamic NFT project. The NFT will use the Chainlink VRF to produce provably random numbers that…☆19Nov 29, 2021Updated 4 years ago
- Implementation of the blindbid logic within Zero Knowledge Proofs☆20Sep 15, 2021Updated 4 years ago
- A tool for linear and differential cryptanalysis of block ciphers written in Rust☆15Sep 28, 2022Updated 3 years ago
- An example malicious payload controller and obfuscator assisted by TPM-protected keys☆39Aug 10, 2014Updated 11 years ago
- [wip] implementing origami VDF☆13Mar 1, 2023Updated 3 years ago
- Draft documents for standardization of Plonkish arithmetization☆23Mar 15, 2024Updated 2 years ago
- a web page / paper☆18Feb 24, 2017Updated 9 years ago
- Prover for the Plumo light client system https://docs.zkproof.org/pages/standards/accepted-workshop3/proposal-plumo_celolightclient.pdf☆14Jan 4, 2022Updated 4 years ago
- LegoGroth16 implementation on top of Zexe☆25Dec 3, 2021Updated 4 years ago
- Multi-party computation for Zcash's "Sapling" zk-SNARK public parameters☆30Jan 22, 2023Updated 3 years ago
- differential fault analysis attacks (DFA) against SM4☆17Jun 6, 2024Updated last year
- SIPP(Statistically sound Inner Pairing Product) verification in SNARK☆17Oct 8, 2023Updated 2 years ago
- An EXPERIMENTAL implementation of the CPace PAKE, instantiated with the Ristretto255 group. In Rust☆16Aug 25, 2020Updated 5 years ago
- ☆27Oct 18, 2022Updated 3 years ago
- writeup of some ctf challs☆11Apr 20, 2025Updated 11 months ago
- ☆33Feb 14, 2025Updated last year
- ☆16Jun 21, 2021Updated 4 years ago
- A substrate pallet that enables Manta's decentialized anynonymous payment (MantaPay) protocol.☆28Mar 2, 2022Updated 4 years ago
- distorm3☆12Jun 16, 2012Updated 13 years ago
- A rusty implementation of the Caulk+ lookup algorithm.☆12Dec 18, 2022Updated 3 years ago
- ☆13Jul 31, 2016Updated 9 years ago
- A library for decentralized private computation☆19Jul 21, 2021Updated 4 years ago
- Proactive refresh for accountable threshold signatures☆36Mar 21, 2023Updated 3 years ago
- Rust implementation of Zcash multi-signautres☆13Jun 23, 2019Updated 6 years ago
- Results of a recent FOIA for NIST documents related to the design of Dual EC DRBG. Via EFF and Rep. Grayson's office. See README for deta…☆24Feb 10, 2015Updated 11 years ago
- A pure rust implementation of the gimli cipher☆13Jan 26, 2022Updated 4 years ago
- A standalone AES-KW (AES Key Wrap) implementation.☆14Dec 31, 2023Updated 2 years ago
- ring-vrf ring proof v2.5☆20Mar 5, 2026Updated 2 weeks ago
- Coconut: Threshold Issuance Selective Disclosure Credentials with Applications to Distributed Ledgers☆13Jan 16, 2020Updated 6 years ago
- Stay updated with the latest deadlines for top Multi-Party Computation (MPC) events, including conferences, journals, and workshops. Neve…☆21Mar 9, 2026Updated 2 weeks ago
- Unofficial implementation of the paper: "Step on the Gas? A Better Approach for Recommending the Ethereum Gas Price"☆23Jan 27, 2021Updated 5 years ago