JHUISI / auto-tools
Automated Cryptographic Transformations
☆27Updated 3 years ago
Alternatives and similar repositories for auto-tools:
Users that are interested in auto-tools are comparing it to the libraries listed below
- XPIR: Private Information Retrieval for Everyone☆116Updated 3 years ago
- ☆49Updated last year
- PoC of an SGX enclave performing symmetric reencryption☆49Updated 8 years ago
- ZKPDL & cashlib: A language-based system for zero-knowledge proofs and electronic cash (e-cash).☆54Updated 8 years ago
- ☆22Updated 8 years ago
- CryptoBib Database for Developers☆43Updated last month
- An implementation of the LowMC block cipher family.☆26Updated 7 years ago
- Optimized implementation of the Picnic signature scheme☆80Updated 2 years ago
- Implementation of the Fish and Begol signature schemes☆13Updated 7 years ago
- Implementation of a pairing over a Barreto-Naehrig curve on top of OpenSSL.☆31Updated 9 years ago
- Prototype implementation of Prio, a system for the private computation of aggregate statistics.☆61Updated 7 years ago
- JHU Advanced Topics in Applied Cryptography (601.745)☆52Updated 6 years ago
- A Flexible Efficient Secure Computation Backend☆33Updated 6 years ago
- Hyrax reference implementation: meta-repo with top-level makefile, etc☆35Updated 7 years ago
- C++ library for Finite Fields and Elliptic Curves☆154Updated 3 years ago
- CryptoBib Main Repository for Developers☆19Updated 6 months ago
- A python library that implements a number of Privacy Enhancing Technolgies☆132Updated 2 years ago
- SageMath library for constructing elliptic curves☆68Updated last year
- FourQlib is an efficient and portable cryptographic library that provides functions for computing elliptic curve based operations on the …☆82Updated 2 years ago
- CryptoBib BibTex files☆56Updated last month
- Symmetric somewhat homomorphic encryption library based on DGHV☆27Updated 7 years ago
- Experiments in homomorphic encryption☆31Updated 9 years ago
- An Implementation of the Fully Homomorphic Smart-Vercauteren Cryptosystem☆44Updated 9 years ago
- A C++ implementation of the TinyLEGO cryptographic protocol [NST17] for general secure two-party computation☆16Updated 7 years ago
- a C++ embedded domain specific language for zero knowledge proofs☆59Updated 8 years ago
- ☆178Updated 3 years ago
- FairplayMP provides secure multiparty computation.☆45Updated 10 years ago
- Malicious Two Party Computation Based on Garbled Circuits.☆12Updated 4 years ago
- The compiler for ObliVM☆65Updated 4 years ago
- Comprehensive Open Source Library for Secure Multiparty Computation☆182Updated last year