tjesi / anonymous-tokensView external linksLinks
☆12May 7, 2021Updated 4 years ago
Alternatives and similar repositories for anonymous-tokens
Users that are interested in anonymous-tokens are comparing it to the libraries listed below
Sorting:
- Efficient Anonymous Tokens with Private Metadata Bit☆15Mar 7, 2023Updated 2 years ago
- We implement Delegatable Anonymous Credentials using Mercurial Signatures☆21Jun 7, 2022Updated 3 years ago
- ☆13Oct 6, 2020Updated 5 years ago
- Parses https://eprint.iacr.org/eprint-bin/search.pl?last=365&title=1 and sends you an email with the latest papers☆15Nov 11, 2020Updated 5 years ago
- C crypto library☆24Aug 2, 2023Updated 2 years ago
- High Speed elliptic curve signature system using a 260-bit Granger Moss Prime.☆14Jun 3, 2021Updated 4 years ago
- Proof-of-concept implementation of the (V)OPRF protocol in https://datatracker.ietf.org/doc/draft-irtf-cfrg-voprf/☆23Aug 24, 2020Updated 5 years ago
- ABE GPSW scheme using BLS pairing implemented in Rust.☆16May 23, 2023Updated 2 years ago
- [RFC9380] Hash to curves - Rust reference implementation☆28Mar 10, 2024Updated last year
- Deterministic/nonce-reuse resistant authenticated encryption scheme using XChaCha20, implemented on libsodium.☆30Aug 5, 2024Updated last year
- Proof of Device☆21Jan 20, 2023Updated 3 years ago
- Implementation and simulations for the "Reducing Metadata Leakage from Encrypted Data and Communication with PURBs" paper☆31Oct 26, 2023Updated 2 years ago
- Faster Montgomery and Joye ladder formulas for short Weierstrass elliptic curves☆22Jul 1, 2020Updated 5 years ago
- A small and easy to use HPKE implementation in Go.☆20Dec 12, 2024Updated last year
- BLST-Verification☆23Jan 22, 2026Updated 3 weeks ago
- Software optimized implementations of GIFT and GIFT-COFB☆18Mar 29, 2022Updated 3 years ago
- Reference implementations of post-quantum cryptographic primitives☆33Aug 27, 2025Updated 5 months ago
- ☆19Jul 13, 2020Updated 5 years ago
- Public working documents (e.g., Internet drafts)☆26Jun 8, 2018Updated 7 years ago
- A history of PGP-related vulnerabilities☆24Jan 13, 2026Updated last month
- A privacy-preserving digital version of punch cards used in store loyalty programs☆11Apr 19, 2021Updated 4 years ago
- DODO smart contract on EVM☆10Mar 5, 2023Updated 2 years ago
- Uniswap Protocol using an Option Framework☆23Sep 7, 2021Updated 4 years ago
- Vector Commitments with Constant-Sized, Updatable Proofs and Linear-Sized Public Parameters☆11Jun 3, 2021Updated 4 years ago
- Verify your NIPoPoWs efficiently, here☆11Dec 8, 2022Updated 3 years ago
- Implements the Barreto-Naehrig (BN) curve as used by Ethereum☆12May 31, 2019Updated 6 years ago
- Unsafe 3-round MuSig in Python for experimentation☆11Jan 12, 2023Updated 3 years ago
- Implementation of https://www.ietf.org/archive/id/draft-denis-aegis-aead-00.html / https://competitions.cr.yp.to/round3/aegisv11.pdf☆14Mar 25, 2025Updated 10 months ago
- The technical paper for the Spark protocol☆11Mar 5, 2024Updated last year
- Models for authenticated key exchange in Tamarin☆12Oct 9, 2019Updated 6 years ago
- zkSNARK full flow example in Go☆12Jun 3, 2020Updated 5 years ago
- Provisions: Privacy-preserving proofs of solvency for Bitcoin☆14Jan 10, 2016Updated 10 years ago
- Schnorr signatures over big curves for Ledger devices. group arithmetic & key derivation for unusual elliptic curves.☆13Apr 9, 2020Updated 5 years ago
- Elliptic curve Go reference implementation☆26Feb 5, 2025Updated last year
- LibSWIFFT - A fast C/C++ library for the SWIFFT secure homomorphic hash function☆29Nov 21, 2023Updated 2 years ago
- Solution to harden TLS security by storing private keys and delegating operations to the Trused Execution Environment☆13Oct 10, 2022Updated 3 years ago
- Zero-related bugs in 4 BLS libs & standard draft,"splitting zero" attacks, $35000 award☆17Aug 20, 2021Updated 4 years ago
- Algorand's reference implementation of bls signature scheme☆14Sep 7, 2020Updated 5 years ago
- Rust bindings to the Knot Resolver library (also known as libkres)☆18Apr 2, 2019Updated 6 years ago