HKU-Seminar / booksLinks
☆34Updated 6 years ago
Alternatives and similar repositories for books
Users that are interested in books are comparing it to the libraries listed below
Sorting:
- A C++ library containing both easy-to-use lower level bigint/ecgroup interfaces and high-level cryptographical schemes/protocols.☆80Updated last month
- LaTeX package for typesetting pseudocode and cryptographic games☆184Updated last year
- ☆48Updated 3 years ago
- Maintain a list of open source libraries of cryptographic excellence☆62Updated 2 years ago
- A page containing many useful links.☆26Updated last year
- Multi-party Private Set Union☆18Updated 9 months ago
- ☆234Updated 8 months ago
- An attempt at a new LWE estimator☆310Updated 3 weeks ago
- Secure Computation Utilities☆15Updated 2 months ago
- Awesome list for cryptographic secure computation paper. This repo includes *Lattice*, *DifferentialPrivacy*, *MPC* and also a comprehens…☆217Updated 10 months ago
- An efficient, user-friendly, modular, and extensible framework for mixed-protocol secure multi-party computation with two or more parties☆89Updated 2 years ago
- Efficient and Interactive Zero-Knowledge Proofs☆99Updated last year
- Implementation of protocols in the paper titled "Scalable Multi-Party Computation Protocols for Machine Learning in the Honest-Majority S…☆29Updated 8 months ago
- Efficient Private Set Intersection base on VOLE☆134Updated last month
- A two-party secure function evaluation using Yao's garbled circuit protocol☆78Updated last year
- A two-party generator for Vector-OLE correlations.☆29Updated 4 years ago
- C++ OT extension implementation☆128Updated 4 years ago
- Homomorphic comparison in leveled homomorphic encryption and its applications☆38Updated 4 years ago
- This repo provides C++ implementation of FHE-based unbalanced private set union (PSU).☆13Updated last year
- Semi-honest Two Party Computation Based on Garbled Circuits.☆79Updated 3 years ago
- ☆37Updated 2 years ago
- Lattices in Cryptography (University of Michigan)☆105Updated last year
- ☆32Updated 2 years ago
- Boolean Query SSE schemes☆16Updated 7 years ago
- A fast, portable, and easy to use Oblivious Transfer Library☆476Updated last month
- ☆125Updated 2 months ago
- Example implementation of the SealPIR protocol☆154Updated 11 months ago
- ☆10Updated last year
- Implementation of some SSE schemes, including Sophos, Diana and Janus☆100Updated 4 years ago
- Practical Multi-party Private Set Intersection from Symmetric-Key Techniques[ACM CCS 2017]☆100Updated 2 years ago