QNLab-USTC / SimQN
A discrete time scheduler designed for Quantum Network
☆41Updated last month
Alternatives and similar repositories for SimQN:
Users that are interested in SimQN are comparing it to the libraries listed below
- ☆16Updated 2 years ago
- A two-party secure function evaluation using Yao's garbled circuit protocol☆74Updated 7 months ago
- ☆25Updated 4 years ago
- Maintain a list of open source libraries of cryptographic excellence☆59Updated last year
- Work-in-progress experiments on Quantum Networking (esp. routing) with NetSquid https://netsquid.org/☆27Updated 4 months ago
- IS416 Final Project. A PoW-based blockchain implementation with attackers trying fork attacks. Language: Go.☆17Updated 3 years ago
- Simulator of QUantum Network Communication (SeQUeNCe) is an open-source tool that allows modeling of quantum networks including photonic …☆97Updated this week
- A new heuristic to optimize implementations of linear matrices☆13Updated 2 years ago
- Quantum Key Distribution Network Simulation Module - implemented in NS-3 dev☆22Updated 10 months ago
- Python implementation of Cascade information reconciliation protocol for Quantum Key Distribution☆20Updated 2 years ago
- A C++ library containing both easy-to-use lower level bigint/ecgroup interfaces and high-level cryptographical schemes/protocols.☆76Updated 6 months ago
- A set of exercises for getting started with the Tamarin prover☆16Updated last year
- ☆103Updated 3 years ago
- ☆112Updated 10 months ago
- Implementation of protocols in the paper titled "Scalable Multi-Party Computation Protocols for Machine Learning in the Honest-Majority S…☆15Updated 3 months ago
- ☆27Updated 5 years ago
- LaTeX package for typesetting pseudocode and cryptographic games☆157Updated last year
- Privacy-preserving Deep Learning based on homomorphic encryption (HE)☆33Updated 3 years ago
- Open source implementation of quantum internet simulation package☆89Updated this week
- Python simulation of protocol BB84 for QKD.☆46Updated 2 years ago
- ☆36Updated 2 years ago
- ☆18Updated last week
- Secure Aggregation for Federated Learning with Malicious Actors☆24Updated 2 years ago
- Cryptographic Enforcement of End-to-End Data Privacy☆24Updated 2 years ago
- Paper Notes in MPC with Applications to PPML☆64Updated 9 months ago
- A page containing many useful links.☆25Updated 4 months ago
- Multi-Key Homomophic Encryption from TFHE☆55Updated 3 years ago
- Homomorphic comparison in leveled homomorphic encryption and its applications☆36Updated 3 years ago
- Implementation of a toolkit for ring-LWE based cryptography in arbitrary cyclotomic number fields.☆35Updated 8 years ago
- ☆28Updated last year