LoCryptEn / Key-securityLinks
☆102Updated 8 months ago
Alternatives and similar repositories for Key-security
Users that are interested in Key-security are comparing it to the libraries listed below
Sorting:
- ☆52Updated 3 years ago
- A C++ library containing both easy-to-use lower level bigint/ecgroup interfaces and high-level cryptographical schemes/protocols.☆81Updated 3 months ago
- A page containing many useful links.☆26Updated last year
- Statistics of acceptance rate for the top conferences: Oakland, CCS, USENIX Security, NDSS.☆207Updated 2 months ago
- Maintain a list of open source libraries of cryptographic excellence☆62Updated last month
- Python wrapper for the PBC (Pairing-Based Cryptography) library☆14Updated last week
- Post-Quantum Magic Project. See more at https://pqcrypto.dev/ . We also open-sourced at https://gitee.com/pqcrypto/pqmagic.☆75Updated 4 months ago
- Fast Privacy-Preserving Machine Learning on the GPU☆88Updated 4 years ago
- Code to run the evaluation of our "Obfuscated Access and Search Patterns in Searchable Encryption", NDSS'21☆12Updated 5 years ago
- Verifiable Forward Secure SSE scheme☆11Updated 5 years ago
- ☆16Updated 2 years ago
- This repo collects the best papers from top 4 computer security conferences, including IEEE S&P, ACM CCS, USENIX Security, and NDSS.☆131Updated 8 months ago
- ☆239Updated last month
- ☆213Updated 10 months ago
- Implementation of some SSE schemes, including Sophos, Diana and Janus☆100Updated 4 years ago
- ☆45Updated 9 months ago
- Code repository for the paper at USENIX Security'24☆35Updated last year
- 可信计算实验☆10Updated 4 years ago
- implementation of seren☆13Updated last year
- Piranha: A GPU Platform for Secure Computation☆103Updated 2 years ago
- FudanMPL 2.0, a series of multi-party learning frameworks, with rich features, including secure and fast XGBoost, secure Fine-tuning for …☆56Updated this week
- TAOISM: A TEE-based Confidential Heterogeneous Deployment Framework for DNN Models☆50Updated last year
- Non-interactive dynamic searchable encryption scheme with forward and Type-II backward privacy☆15Updated 4 years ago
- The repo of "Efficient 3PC for Binary Circuits with Application to Maliciously-Secure DNN Inference" (USENIX Security 2023)☆21Updated 2 years ago
- ☆40Updated 2 years ago
- Some algorithms for computation on encrypted data based on Microsoft SEAL☆28Updated 5 years ago
- NFGen: Automatic Non-Linear Function Evaluation Code Generator for General-purpose MPC Platforms☆20Updated last week
- ☆129Updated 4 months ago
- A series of classic oblivious algorithms written in Python, covering oblivious RAM, oblivious MAP, and oblivious graph processing for cli…☆12Updated this week
- Materials about Privacy-Preserving Machine Learning☆262Updated 3 months ago