RyanRiddle / elgamalLinks
Python implementation of the elgamal crypto system
☆71Updated 5 years ago
Alternatives and similar repositories for elgamal
Users that are interested in elgamal are comparing it to the libraries listed below
Sorting:
- Pure Python Paillier Homomorphic Cryptosystem☆134Updated 6 years ago
- ☆182Updated 4 years ago
- MPyC: Multiparty Computation in Python☆402Updated last week
- Charm: A Framework for Rapidly Prototyping Cryptosystems☆611Updated last month
- (Inactive, see readme) Multiparty computation with SPDZ, MASCOT, and Overdrive offline phases☆222Updated 6 years ago
- Oblivious Transfer, Oblivious Transfer Extension and Variations☆174Updated last week
- Comprehensive Open Source Library for Secure Multiparty Computation☆186Updated 2 years ago
- NTT-based Fast Lattice library☆176Updated 2 years ago
- Code☆492Updated this week
- ☆21Updated 2 years ago
- A system for securely splitting secrets with Shamir's Secret Sharing Scheme☆508Updated 3 years ago
- A fast, portable, and easy to use Oblivious Transfer Library☆468Updated last week
- A generic Secure Computation API for garbled circuits, SPDZ, etc.☆21Updated 2 years ago
- ABY - A Framework for Efficient Mixed-protocol Secure Two-party Computation☆480Updated 3 years ago
- ☆226Updated 6 months ago
- A library for Partially Homomorphic Encryption in Python☆626Updated 2 years ago
- Semi-honest Two Party Computation Based on Garbled Circuits.☆78Updated 2 years ago
- C++ OT extension implementation☆129Updated 4 years ago
- Repository for the SCALE-MAMBA MPC system☆261Updated last year
- LaTeX package for typesetting pseudocode and cryptographic games☆178Updated last year
- ☆233Updated 6 years ago
- The Pairing-based Crypto library☆253Updated 2 weeks ago
- The OpenABE library - open source cryptographic library with attribute-based encryption implementations in C/C++☆272Updated 2 years ago
- Efficient Batched Oblivious PRF with Applications to Private Set Intersection (CCS 2016)☆83Updated 2 years ago
- Implementation of Brakerski's leveled homomorphic encryption system☆44Updated 8 years ago
- Implementation of the DGHV fully homomorphic encryption scheme☆129Updated 9 years ago
- ☆37Updated 12 years ago
- Implementations of Private Set Intersection Protocols☆184Updated last month
- Library for performing Function Secret Sharing (FSS)☆93Updated 6 years ago
- Authenticated Garbling and Efficient Maliciously Secure Two-Party Computation☆30Updated 2 years ago