5GenCrypto / mifeLinks
Multi-input functional encryption
☆12Updated 7 years ago
Alternatives and similar repositories for mife
Users that are interested in mife are comparing it to the libraries listed below
Sorting:
- An implementation of Function-Hiding Inner Product Encryption☆46Updated 9 years ago
- Experiments with Universal Composability in EasyCrypt☆42Updated last week
- Implementation of Valiant's universal circuit construction optimized for private function evaluation☆43Updated 4 years ago
- Oblivious transfer library for rust☆11Updated 5 years ago
- Functional encryption library in C☆89Updated 4 years ago
- Rust implementation of the BMR16 arithmetic garbling scheme.☆34Updated 5 years ago
- Optimized implementation of the Picnic signature scheme☆82Updated 3 years ago
- C implementation of the CLT13 multilinear map☆14Updated 7 years ago
- Slides from talks and other materials related to post-quantum crypto☆12Updated 4 years ago
- lattice-based digital signature scheme qTESLA☆32Updated 6 years ago
- A Language and Compiler for Homomorphic Encryption Made easY☆67Updated 5 years ago
- SQISign: Short Quaternion and Isogeny Signature – C implementation based on PARI/GP (obsolete implementation)☆27Updated 2 years ago
- Schnorr Protocol for Non-interactive Zero-Knowledge Proofs☆76Updated 5 years ago
- Reference repository on Lattice-based Cryptography☆26Updated last year
- Super Amazing Universal Composability, Yeah!☆32Updated 3 years ago
- ☆17Updated 4 years ago
- Crypto library☆66Updated this week
- Multi-party computation utilities toolkit for rust☆16Updated 5 years ago
- An implementation of the LowMC block cipher family.☆27Updated 8 years ago
- Experiments in homomorphic encryption☆31Updated 10 years ago
- Sage implementation of the isogeny-and-pairing based VDF☆24Updated 4 years ago
- Repo for the implementation of the isogeny based signature scheme CSI-FiSh☆25Updated 2 years ago
- A polymorphic interface for elliptic curve operations☆43Updated 2 years ago
- ☆137Updated 5 years ago
- Λ ⚬ λ: Functional Lattice Cryptography☆231Updated 4 years ago
- A depth-aware secure computation compiler☆17Updated 6 months ago
- Implementation of the Fish and Begol signature schemes☆14Updated 8 years ago
- ☆51Updated 2 years ago
- Privacy-preserving auditing for distributed ledgers☆67Updated 6 years ago
- Fast 4 way vectorized ladder for the complete set of Montgomery curves☆11Updated 6 years ago