IBM / fhe-toolkit-androidLinks
IBM Fully Homomorphic Encryption Toolkit For Android
☆36Updated 5 years ago
Alternatives and similar repositories for fhe-toolkit-android
Users that are interested in fhe-toolkit-android are comparing it to the libraries listed below
Sorting:
- An Implementation of the Fully Homomorphic Smart-Vercauteren Cryptosystem☆45Updated 10 years ago
- IBM Homomorphic Encryption Toolkit For MacOS☆365Updated 4 months ago
- Security framework for building multi-user end-to-end encrypted data storage and sharing/processing with zero leakage risks from storage …☆86Updated 4 years ago
- This software is part of "Supersingular Isogeny Key Encapsulation", a submission to the NIST Post-Quantum Standardization project.☆62Updated 3 years ago
- The SIMON and SPECK families of lightweight block ciphers. #nsacyber☆168Updated 6 years ago
- Java implementation of NTRUEncrypt and NTRUSign☆120Updated 4 years ago
- Industry Working Group on Automated Cryptographic Algorithm Validation☆194Updated 2 months ago
- Experiments in high-assurance crypto.☆50Updated 3 years ago
- Security and Privacy Assurance Research Test and Assessment (SPARTA) tool suite☆37Updated 8 years ago
- ☆71Updated last year
- SDK for Keystone Enclave - ABI/SBI libraries and sample apps☆44Updated 3 years ago
- Signature scheme submitted to NIST's Post-Quantum Cryptography Project☆74Updated 8 years ago
- Ximix is a network application offering threshold key generation, signatures, decryption, and a RPC style MixNet☆20Updated 8 years ago
- On Ends-to-Ends Encryption: Asynchronous Group Messaging with Strong Security Guarantees☆270Updated 4 years ago
- Fault attack agaisnt EdDSA demonstrated on an Arduino Nano board, allowing for partial key recovery and fake signatures.☆73Updated 8 years ago
- DEPRECATED – See NOTICE below about migration to new repository – Post-quantum key exchange from the ring learning with errors problem☆60Updated 9 years ago
- Stores Chromium Channel ID private keys in an Intel SGX enclave.☆33Updated 9 years ago
- Supporting materials for our EuroS&P paper: Automated Verification for Secure Messaging Protocols and their Implementations: A Symbolic a…☆37Updated 3 years ago
- Specification of a protocol to transmit APDU commands and responses over Bluetooth Low Energy☆17Updated 7 years ago
- The Mesh is an infrastructure that makes the Internet easier to use by making it more secure.☆41Updated last week
- JCrypTool Crypto Plug-ins☆75Updated 2 years ago
- Java Card FIDO U2F authenticator for Ledger Unplugged☆74Updated 5 years ago
- Cryptanalysis code for the SIMON and SPECK families of block ciphers☆20Updated 10 years ago
- [DEPRECATED] - Apache Milagro Crypto Incubator☆63Updated 6 years ago
- Reference implementation of the Picnic post-quantum signature scheme☆168Updated 2 years ago
- A memory-hard password hashing function.☆71Updated 2 years ago
- Post-quantum cryptography certificates☆77Updated this week
- Libraries for fully homomorphic encryption☆81Updated 9 years ago
- A Shadow plug-in that runs the Tor anonymity software☆50Updated 4 years ago
- Test tool for CTAP2 authenticators☆57Updated 2 years ago