HKU-Seminar / books
☆31Updated 5 years ago
Alternatives and similar repositories for books:
Users that are interested in books are comparing it to the libraries listed below
- LaTeX package for typesetting pseudocode and cryptographic games☆171Updated last year
- A page containing many useful links.☆25Updated 8 months ago
- A C++ library containing both easy-to-use lower level bigint/ecgroup interfaces and high-level cryptographical schemes/protocols.☆78Updated 9 months ago
- Maintain a list of open source libraries of cryptographic excellence☆61Updated 2 years ago
- ☆222Updated 3 months ago
- An efficient, user-friendly, modular, and extensible framework for mixed-protocol secure multi-party computation with two or more parties☆86Updated last year
- A two-party secure function evaluation using Yao's garbled circuit protocol☆75Updated 10 months ago
- A two-party generator for Vector-OLE correlations.☆28Updated 4 years ago
- Multi-party Private Set Union☆17Updated 3 months ago
- The Chinese translation of A Graduate Course in Applied Cryptography by Dan Boneh and Victor Shoup.☆16Updated 2 years ago
- Efficient Private Set Intersection base on VOLE☆127Updated 2 months ago
- ☆117Updated last year
- FLUTE: Fast and Secure Lookup Table Evaluations☆24Updated last year
- This repo provides C++ implementation of FHE-based unbalanced private set union (PSU).☆13Updated 10 months ago
- ☆12Updated 8 months ago
- ☆40Updated 2 years ago
- C++ OT extension implementation☆127Updated 4 years ago
- Lattices in Cryptography (University of Michigan)☆84Updated 7 months ago
- Awesome list for cryptographic secure computation paper. This repo includes *Lattice*, *DifferentialPrivacy*, *MPC* and also a comprehens…☆210Updated 4 months ago
- Private Set Intersection in the Internet Setting From Lightweight Oblivious PRF☆86Updated 2 years ago
- Efficient Batched Oblivious PRF with Applications to Private Set Intersection (CCS 2016)☆82Updated 2 years ago
- ☆30Updated 2 years ago
- The repo of "Efficient 3PC for Binary Circuits with Application to Maliciously-Secure DNN Inference"☆21Updated last year
- Efficient and Interactive Zero-Knowledge Proofs☆91Updated last year
- Practical Multi-party Private Set Intersection from Symmetric-Key Techniques[ACM CCS 2017]☆97Updated last year
- Fast, High-Rate Single-Server PIR via FHE Composition☆30Updated 3 years ago
- Private Decision Tree Evaluation protocols☆11Updated 4 years ago
- ☆34Updated 4 years ago
- A repo to hold common tools used by my crypto projects☆130Updated 2 weeks ago
- Constant-weight PIR using Constant-weight Equality Operators☆23Updated 3 years ago