-
Hi Post Office maintainers!
As per title of this issue, @dododevs and I are working on the implementation of the PGP standard for this library. The goal is being able to send PGP encrypted messages…
-
This one's from discord, from user Moskalyk, one of the waterloo hackers.
> Curious, if I was wanting to perform stream processing with rust, is there any reason why enigma secret contracts wouldn'…
-
_to be submited on [https://github.com/zama-ai/bounty-program/issues](https://github.com/zama-ai/bounty-program/issues)_
**title**: Bounty Specification: Creation of a Decentralized Identity System…
-
Dear Community,
I was trying to distribute the computations to 3 separate nodes, where each node receives a user's secret share in MPCTensor and an encrypted model, and returns a MPCTensor output. …
-
Not sure if this will work with El Gamal encryptions, but if we encrypted two numbers say 10,000 and 100,000, we might be able to check if amount is < 10,000 || < 100,000
function lessThan(G1Point …
-
I am looking at GEMM computations in EVA.
EVA uses vectorised computations, though following the paper [Secure Outsourced Matrix Computation and Application to Neural Networks](https://dl.acm.org…
-
Looking at the "specification" document:
It is said (on p11) that the server explicitly computes the risk score
> 2. computes a ”risk score” value, derived in part from the list LEE_A.
before…
-
# Team name
TNLS
# Project Description
In this proposal, we propose a bridge solution for encrypted data between SCRT and public blockchains. We review existing bridge solutions and their respe…
-
The title says it all.
Ability to set a password that, when entered, destroys the data. Preferably _**without**_ pop up message saying you did.
Or by using a 'decoy' keyfile.
While at it, might a…
-
Main reading: https://cheatsheetseries.owasp.org/cheatsheets/Password_Storage_Cheat_Sheet.html
- Password should be hashed, NOT encrypted.
- Hashing is a one-way function, encryption is a two…