Protocols for Checking Compromised Credentials Paper link here: https://arxiv.org/pdf/1905.13737.pdf This repository contains the code we used to for the security simulations and performance analysis, the results of which are recorded in the paper.