CircuitMurderer / MPC-PlatformLinks
MPC(Multi-Party Computation) all in one.
☆145Updated 8 months ago
Alternatives and similar repositories for MPC-Platform
Users that are interested in MPC-Platform are comparing it to the libraries listed below
Sorting:
- ☆146Updated 9 months ago
- ☆144Updated 8 months ago
- ☆148Updated 8 months ago
- ☆145Updated 8 months ago
- ☆152Updated 8 months ago
- [开源软件发布]基于蓝牙的病毒追踪系统,采用BLE低功耗蓝牙,通过SM3加密认证保护用户数据安全性,提供包括Android开发,IOS开发,以及Java服务器开发的完整代码和直接可以运行的apk文件☆153Updated 5 months ago
- ☆143Updated 8 months ago
- ☆75Updated 7 months ago
- SimdMSM: SIMD-accelerated Multi-Scalar Multiplication Framework for zkSNARKs☆165Updated 8 months ago
- ☆155Updated 7 months ago
- A secure IoT authentication framework based on hardware fingerprinting☆157Updated 9 months ago
- efficient anti side channel SHA3 algorithm software and hardware co-design☆155Updated 8 months ago
- 基于IFTTT平台的隐私挖掘工具☆53Updated 8 months ago
- Code for CVPR 2024 "Revisiting Adversarial Training under Long-Tailed Distributions".☆159Updated 9 months ago
- ☆25Updated 9 months ago
- 本项目基于兼具加密与计算双重能力的全同态加密算法、利用微软开源库Microsoft-Seal而设计出的一套能够保护医疗数据的云计算系统。☆64Updated 8 months ago
- High-efficiency Secure Two Party Computation on GPU☆175Updated 8 months ago
- ☆148Updated last year
- 国密算法的纯 Python 实现.☆301Updated 8 months ago
- ☆167Updated 8 months ago
- The implementation of our AAAI 2024 paper "Reverse Multi-Choice Dialogue Commonsense Inference with Graph-of-Thought"☆200Updated 8 months ago
- A rl-based waf bypass tool☆247Updated 8 months ago
- Code for USENIX Security 2025 paper "JBShield: Defending Large Language Models from Jailbreak Attacks through Activated Concept Analysis …☆213Updated 7 months ago
- WHU大二 计算机设计 流水线CPU设计 课程作业☆12Updated 9 months ago
- ☆18Updated 8 months ago
- GAN you see me? enhanced data reconstruction attacks against split inference - NeurIPS 2023☆12Updated 9 months ago
- Updatable Private Set Intersection Revisited: Extended Functionalities, Deletion, and Worst-Case Complexity (Asiacrypt 2024)☆22Updated 3 months ago
- From Head to Tail: Efficient Black-box Model Inversion Attack via Long-tailed Learning - CVPR 2025☆16Updated 9 months ago
- Official code of the paper "A Stealthy Wrongdoer: Feature-Oriented Reconstruction Attack against Split Learning".☆15Updated last year
- This repository provide the studies on the security of language models for code (CodeLMs).☆51Updated 10 months ago