Signature scheme submitted to NIST's Post-Quantum Cryptography Project
-
Updated
Dec 6, 2017 - C
Signature scheme submitted to NIST's Post-Quantum Cryptography Project
Signature scheme submitted to NIST's Post-Quantum Cryptography Project
✨ File format and optimizer for programs encoded in binary lambda calculus
OpenCL powered Merklization using BLAKE3
A basic model of a Blockchain algorithm that uses the data structure of a Merkle Tree with SHA256 encryption and works by storing medical data such as patients names and their diagnostics.
An improved C reference implemented on top of the technique introduced at "Shorter hash-based signatures"
A university project P2P File-Transfer program that allows sending, receiving and detection of anomalous data chunks. the program’s aim is to manage files, check integrity of chunks and files, share files and chunks, handle peer connections and requests. Unlike other file-transfer programs, there are no tracker or relay systems in place.
File System Integrity - Operating Systems
EncryptFS: Encrypted Integrity-Preserving Filesystem
The goal of this assignment is to get familiar with Linux file system APIs.We are to implement a secure library (SecureFS) on top of the existing file system interfaces that raises the alarm if, the integrity of the files created through the secure library APIs is compromised. We need to check the consistency of file blocks before every read and write.
Morphable Counters: Enabling Compact Integrity Trees For Low-Overhead Secure Memories -- MICRO 2018
Add a description, image, and links to the merkle-tree topic page so that developers can more easily learn about it.
To associate your repository with the merkle-tree topic, visit your repo's landing page and select "manage topics."