LoCryptEn / Key-securityLinks
☆102Updated 9 months ago
Alternatives and similar repositories for Key-security
Users that are interested in Key-security are comparing it to the libraries listed below
Sorting:
- ☆52Updated 3 years ago
- A C++ library containing both easy-to-use lower level bigint/ecgroup interfaces and high-level cryptographical schemes/protocols.☆82Updated 4 months ago
- A page containing many useful links.☆26Updated last year
- Maintain a list of open source libraries of cryptographic excellence☆62Updated 2 months ago
- ☆16Updated 2 years ago
- Post-Quantum Magic Project. See more at https://pqcrypto.dev/ . We also open-sourced at https://gitee.com/pqcrypto/pqmagic.☆77Updated 6 months ago
- Code to run the evaluation of our "Obfuscated Access and Search Patterns in Searchable Encryption", NDSS'21☆11Updated 5 years ago
- Statistics of acceptance rate for the top conferences: Oakland, CCS, USENIX Security, NDSS.☆213Updated 3 months ago
- Python wrapper for the PBC (Pairing-Based Cryptography) library☆14Updated 3 weeks ago
- SOCI is a Secure Outsourced Computation on Integers based on the Paillier cryptosystem and a twin-server architecture☆116Updated 2 years ago
- Fast Privacy-Preserving Machine Learning on the GPU☆89Updated 4 years ago
- Code repository for the paper at USENIX Security'24☆37Updated last year
- ☆214Updated 11 months ago
- SOCI is a Secure Outsourced Computation on Integers based on the Paillier cryptosystem and a twin-server architecture☆102Updated 2 years ago
- Materials about Privacy-Preserving Machine Learning☆263Updated 4 months ago
- FudanMPL 2.0, a series of multi-party learning frameworks, with rich features, including secure and fast XGBoost, secure Fine-tuning for …☆57Updated 2 weeks ago
- Verifiable Forward Secure SSE scheme☆10Updated 5 years ago
- My Final Year Project using Microsoft SEAL: Logistic Regression over Encrypted Data.☆33Updated 4 years ago
- Paper Notes in MPC with Applications to PPML☆71Updated last year
- A series of classic oblivious algorithms written in Python, covering oblivious RAM, oblivious MAP, and oblivious graph processing for cli…☆12Updated last week
- A framework for secure, handy, accurate, and fast transformer inference☆25Updated 5 months ago
- ☆240Updated 2 months ago
- This repo collects the best papers from top 4 computer security conferences, including IEEE S&P, ACM CCS, USENIX Security, and NDSS.☆133Updated 9 months ago
- Implementation of Distributed function secret sharing and applications☆15Updated 8 months ago
- Private Inference on Transformer☆30Updated 2 years ago
- NFGen: Automatic Non-Linear Function Evaluation Code Generator for General-purpose MPC Platforms☆20Updated last month
- Implementation of some SSE schemes, including Sophos, Diana and Janus☆100Updated 4 years ago
- A fast, portable, and easy to use Oblivious Transfer Library☆484Updated last week
- A secure multi-party computation library based on arithmetic secret sharing and function secret sharing.☆92Updated last week
- A Backward-Secure Searchable Encryption Scheme from Symmetric Puncturable Encryption☆44Updated 7 years ago