LoCryptEn / Key-securityLinks
☆102Updated 7 months ago
Alternatives and similar repositories for Key-security
Users that are interested in Key-security are comparing it to the libraries listed below
Sorting:
- ☆50Updated 3 years ago
- A page containing many useful links.☆26Updated last year
- A C++ library containing both easy-to-use lower level bigint/ecgroup interfaces and high-level cryptographical schemes/protocols.☆81Updated 2 months ago
- Post-Quantum Magic Project. See more at https://pqcrypto.dev/ . We also open-sourced at https://gitee.com/pqcrypto/pqmagic.☆74Updated 4 months ago
- Statistics of acceptance rate for the top conferences: Oakland, CCS, USENIX Security, NDSS.☆206Updated last month
- openhitls☆75Updated last week
- Maintain a list of open source libraries of cryptographic excellence☆62Updated 3 weeks ago
- Fast Privacy-Preserving Machine Learning on the GPU☆88Updated 4 years ago
- Code to run the evaluation of our "Obfuscated Access and Search Patterns in Searchable Encryption", NDSS'21☆12Updated 5 years ago
- This repo collects the best papers from top 4 computer security conferences, including IEEE S&P, ACM CCS, USENIX Security, and NDSS.☆128Updated 7 months ago
- ☆236Updated last month
- Verifiable Forward Secure SSE scheme☆11Updated 5 years ago
- ☆211Updated 9 months ago
- Cryptography course slides at Harbin Institute of Technology☆194Updated last year
- IS416 Final Project. A PoW-based blockchain implementation with attackers trying fork attacks. Language: Go.☆17Updated 3 years ago
- TAOISM: A TEE-based Confidential Heterogeneous Deployment Framework for DNN Models☆50Updated last year
- pMPL: A Robust Multi-Party Learning Framework with a Privileged Party. This project is connected with the publication @ ACM CCS 2022.☆17Updated last year
- A series of classic oblivious algorithms written in Python, covering oblivious RAM, oblivious MAP, and oblivious graph processing for cli…☆12Updated this week
- Implementation of some SSE schemes, including Sophos, Diana and Janus☆100Updated 4 years ago
- icml24☆12Updated 9 months ago
- Piranha: A GPU Platform for Secure Computation☆103Updated 2 years ago
- ☆43Updated 8 months ago
- ☆127Updated 3 months ago
- Academic Cooperation Lab☆19Updated 2 months ago
- ☆40Updated 2 years ago
- ☆15Updated 2 years ago
- Example implementation of the SealPIR protocol☆157Updated last year
- Python wrapper for the PBC (Pairing-Based Cryptography) library☆14Updated 3 weeks ago
- ☆11Updated last year
- YACL (Yet Another Common crypto library) is a C++ library that contains cryptography, network and io modules which other SecretFlow code …☆122Updated this week