Nym DocsNetworkNetwork
OperatorsOperatorsAPIsAPIs
GitHubGitHub (opens in a new tab)Network ExplorerMatrix Logo
  • Introduction
  • Overview
    • The Privacy Problem
    • Choosing a Mode
    • Nym vs Other Systems
  • dVPN Mode
    • Protocol & Encryption
    • Censorship Resistance
  • Mixnet Mode
    • Loopix Design
    • Traffic Flow
    • Cover Traffic
    • Packet Mixing
    • Anonymous Replies (SURBs)
  • Cryptography
    • Sphinx
    • zk-nym Credentials
      • Generate & Use Flow
      • Feature: Rerandomisation
      • Feature: Unlinkability
      • Feature: Double Spend Protection
    • Encryption Standards Used in Nym
  • Infrastructure
    • Nyx Blockchain
    • Nym Nodes
  • Reference
    • Addressing System
    • Epochs
    • Acknowledgements

  • Licensing
  • Code of Conduct
Network
Cryptography
Encryption Standards Used in Nym

Encryption Standards

This page is being rewritten to reflect the cryptographic changes in the Lewes Protocol release. For the current overview, see the Nym Trust Center: Cryptography (opens in a new tab).

Feature: Double Spend ProtectionInfrastructure

MIT 2026 © Nextra.