Jasje / JasjeUI
Jasje Edit
☆15Updated 11 years ago
Related projects ⓘ
Alternatives and complementary repositories for JasjeUI
- Ascon family of lightweight authenticated encryption and hashing schemes, made developer-friendly and with Init-Update-Final paradigms☆14Updated 2 years ago
- Polycircuit is an FHE components library built via FHERMA competitions☆16Updated 2 weeks ago
- Software optimized implementations of GIFT and GIFT-COFB☆18Updated 2 years ago
- Implementation of S3ORAM (CCS'17 & ACM TOPS'20)☆18Updated 2 years ago
- A Basic SPN cryptanalysis☆14Updated 2 years ago
- Vector OLE and zero-knowledge for Z2k. https://ia.cr/2022/819☆16Updated last year
- LaTeX class for the IACR Transactions on Symmetric Cryptology☆28Updated 3 months ago
- ☆17Updated 2 weeks ago
- Lattice reduction technique☆10Updated 10 years ago
- HE-MAN – Homomorphically Encrypted MAchine learning with oNnx models and Concrete☆11Updated last year
- ☆11Updated last year
- Implementation of the LLL algorithm in C. Also provides a cython wrapper for the C function so that it may be used in python.☆11Updated 11 years ago
- Provides common files for instances of mupq, e.g., for pqm4 and pqriscv☆9Updated last week
- MLKEM implementation optimized for embedded microcontrollers☆14Updated 2 months ago
- ☆11Updated 2 years ago
- The repo of "Efficient 3PC for Binary Circuits with Application to Maliciously-Secure DNN Inference"☆17Updated last year
- Team CEA-EPFL-Inpher: code for the iDash 2018 competition☆21Updated 6 years ago
- SIMD Vectorized implementation of X25519, Ed25519, X448 and Ed448☆27Updated 3 months ago
- Python implementations of various NTT/INTT and NTT-based polynomial multiplication algorithms☆30Updated 4 years ago
- OpenFHE-Based Examples of Logistic Regression Training using Nesterov Accelerated Gradient Descent☆21Updated last year
- The HEBench (homomorphic encryption benchmark) frontend consists of the components relevant to users running benchmarks, extending the te…☆17Updated last year
- Optimized implementations of the Number Theoretic Transform (NTT) algorithm for the ring R/(X^N + 1) where N=2^m.☆20Updated 2 years ago
- Fast 4 way vectorized ladder for the complete set of Montgomery curves☆10Updated 5 years ago
- Additional implementation of BIKE (Bit Flipping Key Encapsulation)☆48Updated 7 months ago
- Incremental Offline/Online PIR☆14Updated 7 months ago
- An easy-to-use, general and open-source tool to search for guess-and-determine attacks and key bridges☆27Updated last week
- NIST Lightweight Cryptography Primitives☆54Updated 2 years ago
- Saber and NTRU on M4 and AVX2☆16Updated 2 years ago
- Script generated finite field arithmetic for elliptic curve cryptography☆17Updated this week
- The implementation of Tiptoe's linearly-homomorphic encryption scheme, accompanying the paper "Private Web Search with Tiptoe" (SOSP 2023…☆14Updated last year