HKU-Seminar / booksLinks
☆33Updated 5 years ago
Alternatives and similar repositories for books
Users that are interested in books are comparing it to the libraries listed below
Sorting:
- Maintain a list of open source libraries of cryptographic excellence☆61Updated 2 years ago
- LaTeX package for typesetting pseudocode and cryptographic games☆174Updated last year
- A C++ library containing both easy-to-use lower level bigint/ecgroup interfaces and high-level cryptographical schemes/protocols.☆78Updated 10 months ago
- A page containing many useful links.☆26Updated 8 months ago
- Multi-party Private Set Union☆18Updated 4 months ago
- ☆40Updated 2 years ago
- Efficient and Interactive Zero-Knowledge Proofs☆91Updated last year
- Secure Computation Utilities☆11Updated 11 months ago
- ☆222Updated 3 months ago
- Homomorphic comparison in leveled homomorphic encryption and its applications☆37Updated 3 years ago
- ☆21Updated 2 years ago
- Implementation for the protocols described in https://eprint.iacr.org/2023/1700☆13Updated 4 months ago
- Lattices in Cryptography (University of Michigan)☆85Updated 8 months ago
- This repo provides C++ implementation of FHE-based unbalanced private set union (PSU).☆13Updated 11 months ago
- ☆34Updated last year
- FLUTE: Fast and Secure Lookup Table Evaluations☆25Updated last year
- ☆16Updated last year
- Semi-honest Two Party Computation Based on Garbled Circuits.☆78Updated 2 years ago
- A two-party generator for Vector-OLE correlations.☆29Updated 4 years ago
- Private Set Intersection in the Internet Setting From Lightweight Oblivious PRF☆86Updated 2 years ago
- Practical Multi-party Private Set Intersection from Symmetric-Key Techniques[ACM CCS 2017]☆98Updated last year
- An efficient, user-friendly, modular, and extensible framework for mixed-protocol secure multi-party computation with two or more parties☆86Updated last year
- A sage Toolkit for mounting/estimating attacks on LWE with Side Information☆46Updated last year
- Fast, High-Rate Single-Server PIR via FHE Composition☆31Updated 3 years ago
- Crypto and networking utils used for ABY and OTExtension☆19Updated 3 years ago
- Efficient Private Set Intersection base on VOLE☆131Updated 2 months ago
- ☆41Updated last week
- The Chinese translation of A Graduate Course in Applied Cryptography by Dan Boneh and Victor Shoup.☆17Updated 2 years ago
- The repo of "Efficient 3PC for Binary Circuits with Application to Maliciously-Secure DNN Inference" (USENIX Security 2023)☆21Updated last year
- MIRROR: Discrete Gaussians over the Integers☆18Updated 6 years ago