PP-FM / ZKUNSATLinks
☆20Updated 10 months ago
Alternatives and similar repositories for ZKUNSAT
Users that are interested in ZKUNSAT are comparing it to the libraries listed below
Sorting:
- LaTeX package for typesetting pseudocode and cryptographic games☆187Updated 2 years ago
- Efficient and Interactive Zero-Knowledge Proofs☆101Updated 3 weeks ago
- Experiments with Universal Composability in EasyCrypt☆42Updated last week
- Lattices in Cryptography (University of Michigan)☆107Updated last year
- ☆183Updated 4 years ago
- Semi-honest Two Party Computation Based on Garbled Circuits.☆80Updated 3 weeks ago
- Homomorphic comparison in leveled homomorphic encryption and its applications☆38Updated 4 years ago
- A suite of rust libraries for secure multi-party computation☆329Updated 3 weeks ago
- A sage Toolkit for mounting/estimating attacks on LWE with Side Information☆51Updated 2 years ago
- ☆236Updated 3 weeks ago
- CryptoBib BibTex files☆62Updated last month
- An attempt at a new LWE estimator☆318Updated 2 months ago
- A two-party secure function evaluation using Yao's garbled circuit protocol☆78Updated last year
- ☆53Updated last week
- Rust implementation of the BMR16 arithmetic garbling scheme.☆34Updated 5 years ago
- EasyCrypt: Computer-Aided Cryptographic Proofs☆375Updated this week
- Repository for the SCALE-MAMBA MPC system☆263Updated 2 years ago
- Global-Scale Secure Multiparty Computation☆49Updated 3 weeks ago
- LaTeX package to Do The Right Thing☆13Updated 4 years ago
- ☆10Updated 5 years ago
- Functional encryption library in C☆89Updated 4 years ago
- ☆26Updated 6 years ago
- ☆25Updated 3 years ago
- Efficient Private Set Intersection base on VOLE☆135Updated 3 months ago
- C++ OT extension implementation☆128Updated 5 years ago
- Multi-party Private Set Union☆18Updated 10 months ago
- ☆43Updated last year
- Example implementation of the SealPIR protocol☆157Updated last year
- FLUTE: Fast and Secure Lookup Table Evaluations☆27Updated last year
- Implementation of SortingHat: Efficient Private Decision Tree Evaluation via Homomorphic Encryption and Transciphering.☆19Updated 3 years ago