Maintain a list of open source libraries of cryptographic excellence
☆62Nov 21, 2025Updated 4 months ago
Alternatives and similar repositories for crypto-lib-list
Users that are interested in crypto-lib-list are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Private Inference on Transformer☆30Jun 13, 2023Updated 2 years ago
- A framework for generic hybrid two-party computation and private inference with neural networks☆31Feb 26, 2023Updated 3 years ago
- The repo of "Efficient 3PC for Binary Circuits with Application to Maliciously-Secure DNN Inference" (USENIX Security 2023)☆21Jun 27, 2023Updated 2 years ago
- ☆14Jan 28, 2021Updated 5 years ago
- HACK PROGRAM☆19Feb 7, 2018Updated 8 years ago
- ☆215Feb 25, 2025Updated last year
- Implementation of protocols in the paper titled "Scalable Multi-Party Computation Protocols for Machine Learning in the Honest-Majority S…☆31Feb 15, 2025Updated last year
- This code is algorithmic reproduction of A Traceable and Revocable Ciphertext-Policy Attribute-based Encryption Scheme Based on Privacy P…☆32Apr 13, 2023Updated 2 years ago
- HEhub is a library for homomorphic encryption and its applications, and is part of the PrimiHub project.☆98Dec 20, 2022Updated 3 years ago
- ☆184Jun 21, 2021Updated 4 years ago
- A page containing many useful links.☆26Sep 6, 2024Updated last year
- Code repository for the paper at USENIX Security'24☆37Aug 11, 2024Updated last year
- ☆443Jun 19, 2024Updated last year
- A repo to hold common tools used by my crypto projects☆132Sep 30, 2025Updated 5 months ago
- A fast, portable, and easy to use Oblivious Transfer Library☆488Jan 26, 2026Updated last month
- Antchain-MPC is a library of MPC (Multi-Parties Computation)☆60Dec 26, 2023Updated 2 years ago
- IBE implementation based on jpbc☆17Jan 9, 2022Updated 4 years ago
- Benchmarks for various multi-party computation frameworks☆18Oct 28, 2024Updated last year
- A two-party generator for Vector-OLE correlations.☆31Jan 17, 2021Updated 5 years ago
- Flexible revocation in ciphertext-policy attribute-based encryption with verifiable ciphertext delegation.☆23Mar 27, 2023Updated 2 years ago
- Monomi designer and planner prototype☆14Feb 16, 2015Updated 11 years ago
- ☆129Sep 1, 2025Updated 6 months ago
- Input scripts for securely evaluating quantized ImageNet models with mp-spdz☆19Oct 6, 2020Updated 5 years ago
- An efficient, user-friendly, modular, and extensible framework for mixed-protocol secure multi-party computation with two or more parties☆91Jul 20, 2023Updated 2 years ago
- Crypto and networking utils used for ABY and OTExtension☆19Jul 6, 2021Updated 4 years ago
- Paper Notes in MPC with Applications to PPML☆71Mar 22, 2024Updated 2 years ago
- SLPs for the ToSC Volume 2017 Issue 4 paper 'Shorter Linear Straight-Line Programs for MDS Matrices'☆20Oct 16, 2021Updated 4 years ago
- Cryptographic toolkit for searchable encryption.☆29Jan 25, 2021Updated 5 years ago
- Low-Interaction Privacy-Preserving Deep Learning via Function Secret Sharing☆51Jul 14, 2021Updated 4 years ago
- 一个抓取freebuf所有栏目的文章的爬虫,以网页形式展现,上传了一些爬取好的结果☆15Aug 20, 2016Updated 9 years ago
- FLUTE: Fast and Secure Lookup Table Evaluations☆28Apr 15, 2024Updated last year
- Function secret sharing (FSS) primitives including distributed point/comparison function (DPF/DCF)☆30Updated this week
- ABY - A Framework for Efficient Mixed-protocol Secure Two-party Computation☆492Feb 22, 2022Updated 4 years ago
- Simple python implementation of NTRUEncrypt cryptosystem☆58Dec 22, 2020Updated 5 years ago
- Sample code and build environments for MPC frameworks☆521Dec 12, 2024Updated last year
- ☆11May 29, 2024Updated last year
- dblp Knowledge Graph☆15Jan 16, 2025Updated last year
- ☆26Sep 6, 2020Updated 5 years ago
- ☆251Jun 5, 2025Updated 9 months ago