ThuWangzw / RSALinks
2020清华大学软件学院应用密码学大作业
☆11Updated 4 years ago
Alternatives and similar repositories for RSA
Users that are interested in RSA are comparing it to the libraries listed below
Sorting:
- A page containing many useful links.☆26Updated 9 months ago
- Efficient and Straggler-Resistant Homomorphic Encryption for Heterogeneous Federated Learning☆31Updated last week
- Paper Notes in MPC with Applications to PPML☆69Updated last year
- Maintain a list of open source libraries of cryptographic excellence☆62Updated 2 years ago
- ☆41Updated 2 years ago
- PPA attack code☆12Updated 2 years ago
- Repository for collection of research papers on multi-party learning.☆32Updated last year
- 全国密码技术竞赛论文 latex模板☆12Updated 2 years ago
- 2018年全国大学生信息安全竞赛作品赛一等奖☆31Updated 4 months ago
- XDU-计科网安方向大数据安全与隐私实验三阶梯三-数据差分隐私处理☆12Updated 3 years ago
- [arXiv'21] Additively Symmetric Homomorphic Encryption for Cross-Silo Federated Learning☆22Updated 2 months ago
- ☆20Updated 6 years ago
- 对称可搜索加密,Cash的实现方案☆18Updated 7 years ago
- Secure Aggregation for Federated Learning with Malicious Actors☆25Updated 2 years ago
- Code repository for the paper at USENIX Security'24☆29Updated 10 months ago
- Symmetric-key Hidden Vector Encryption Scheme☆19Updated 6 years ago
- EngrMMansoor / FedDP-A-Privacy-Protecting-Theft-Detection-Scheme-in-Smart-Grids-Using-Federated-LearningThis repository contains the dataset used in the study of "FedDP: A Privacy-Protecting Theft Detection Scheme in Smart Grids Using Federa…☆8Updated 7 months ago
- A Backward-Secure Searchable Encryption Scheme from Symmetric Puncturable Encryption☆41Updated 6 years ago
- personal implementation of secure aggregation protocol☆46Updated last year
- Efficient Secure Computation Protocols for Trigonometric Functions via Function Secret Sharing☆21Updated 2 years ago
- ☆12Updated last year
- 可编辑区块链,基于以太坊智能合约的区块编辑抽象层,利用变色龙哈希实现对过去区块的修改删除等操作☆14Updated 4 years ago
- Code & supplementary material of the paper Label Inference Attacks Against Federated Learning on Usenix Security 2022.☆84Updated 2 years ago
- This is a recommended paper list for the course of Privacy Computing.☆11Updated last year
- Cryptography course slides at Harbin Institute of Technology☆191Updated last year
- Private Inference on Transformer☆25Updated 2 years ago
- 全国大学生信息安全竞赛作品赛 非官方 LaTex 论文模板☆25Updated last year
- Code to run the evaluation of our "Obfuscated Access and Search Patterns in Searchable Encryption", NDSS'21☆13Updated 4 years ago
- 基于全同态加密的安全人脸识别系统/Secure Face Recognition System based on Fully Homomorphic Encryption☆146Updated 2 years ago
- 这是一个基于Paillier同态加密系统的隐私保护SVM模型训练算法。☆17Updated 2 years ago