Python implementation of the elgamal crypto system
☆72Jul 14, 2020Updated 5 years ago
Alternatives and similar repositories for elgamal
Users that are interested in elgamal are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A Codespace repo for ECON 235 & LB 235☆27Jan 30, 2025Updated last year
- Pure Python Paillier Homomorphic Cryptosystem☆135Oct 17, 2018Updated 7 years ago
- Ring signature implementations in Python☆18Jan 11, 2026Updated 2 months ago
- Saratov State University, CSIT. Discipline "cryptographic methods of information security" (криптографические методы защиты информации, r…☆15Jun 28, 2018Updated 7 years ago
- ☆18Jan 12, 2024Updated 2 years ago
- This Projects has implemented three asymmetric and homomorphic encryption BGN, Benaloh, Paillier in Java using JPBC library.☆10Dec 27, 2019Updated 6 years ago
- Java implementation of Paillier algorithm. This is one of the few known system that preserves additive homomorphic properties. JCA Pailli…☆11Jan 29, 2019Updated 7 years ago
- Multi-party Private Set Intersections & Threshold Set Intersections☆14Apr 2, 2021Updated 4 years ago
- A Java implementation of Paillier cryptosystem.☆36Dec 7, 2018Updated 7 years ago
- Symmetric Partial Homomorphic Encryption☆15Oct 13, 2020Updated 5 years ago
- Sprouts Official Development Tree☆17Oct 3, 2018Updated 7 years ago
- Codespace for Solana development using Anchor Framework.☆22Nov 14, 2021Updated 4 years ago
- A library for Partially Homomorphic Encryption in Python☆633Aug 4, 2023Updated 2 years ago
- ☆10Apr 30, 2020Updated 5 years ago
- Google Map combined with Electron☆11Jun 20, 2016Updated 9 years ago
- Arbitrary precision integers in TensorFlow☆11Dec 27, 2022Updated 3 years ago
- Secure Interrogation of Genomic Databases (SIG-DB) using Homomorphic Encryption☆10May 16, 2018Updated 7 years ago
- Secure Logistic Regression based on Homomorphic Encryption☆43Aug 2, 2019Updated 6 years ago
- OpenPGP Long Key ID Collider☆16Jan 19, 2020Updated 6 years ago
- The highest secure note and password manager based on Bitcoin SV☆11Apr 1, 2025Updated 11 months ago
- Library of Bitcoin functions☆20Mar 3, 2024Updated 2 years ago
- 基于HElib库的云计算平台设计与 实现☆12Apr 18, 2016Updated 9 years ago
- Go version of the Pedersen commitment scheme☆15Apr 11, 2020Updated 5 years ago
- deepracer-for-codespaces is a starter repository from AI Castle School that lets you train AWS DeepRacer models right inside GitHub Codes…☆23Apr 26, 2025Updated 10 months ago
- ☆11May 17, 2021Updated 4 years ago
- portaudio Java bindings☆15Mar 22, 2013Updated 13 years ago
- ☆12Dec 24, 2024Updated last year
- An example of selenium-webdriver and winappdriver integration☆12Nov 29, 2020Updated 5 years ago
- SECCURE compatible Elliptic Curve cryptography in Python☆94Feb 4, 2020Updated 6 years ago
- Create a Toxicity Chart based on metrics provided by checkstyle rules.☆10Aug 13, 2015Updated 10 years ago
- A Python library for private set intersection☆13Apr 27, 2020Updated 5 years ago
- ☆10Mar 7, 2026Updated 2 weeks ago
- Deep learning side channel privileged memory reader☆45Jun 28, 2018Updated 7 years ago
- Helios Server (Helios is an end-to-end verifiable voting system) as library☆13Nov 12, 2018Updated 7 years ago
- A living market landscape with a technology foundation, created by and for the DLT community☆15Updated this week
- Implementations of Ring Signature schemes.☆24Feb 26, 2018Updated 8 years ago
- Open source software (+hardware) project to build an inexpensive Lightning Network ATM☆19Oct 14, 2020Updated 5 years ago
- Implementation of zRA protocol, a non-interactive method for constructing a transparent remote attestation (RA) protocol based on zkSNARK…☆22Jun 27, 2025Updated 8 months ago
- C API for Vortex Tracker II Player☆12Jun 7, 2022Updated 3 years ago