TrustworthyComputing / masticLinks
Mastic: Private Weighted Heavy-Hitters and Attribute-Based Metrics
☆12Updated last year
Alternatives and similar repositories for mastic
Users that are interested in mastic are comparing it to the libraries listed below
Sorting:
- ☆19Updated 2 months ago
- FN-DSA (Falcon) signature scheme☆49Updated 10 months ago
- Script generated finite field arithmetic for elliptic curve cryptography☆24Updated 2 months ago
- Passive-Swoosh: Practical Lattice-Based Non-Interactive Key Exchange☆27Updated last year
- Banquet implementation☆14Updated 3 years ago
- Official SQISignHD code, version under continuous development.☆12Updated 6 months ago
- Latex classes for IACR publications.☆15Updated last week
- Curve ecGFp5☆69Updated 3 years ago
- ☆17Updated 3 years ago
- BAT KEM/Signature Reference Implementation☆23Updated 4 years ago
- ABE GPSW scheme using BLS pairing implemented in Rust.☆16Updated 2 years ago
- Pointcheval Sanders signature☆27Updated 6 years ago
- A safe pure-rust implementation of the NTRU post-quantum scheme.☆21Updated 3 years ago
- This is only the beginning.☆19Updated this week
- toy implementation of bfv in rust☆27Updated 3 years ago
- An implementation of a post quantum anonymous credential scheme☆16Updated last year
- MAYO C implementation☆21Updated 10 months ago
- ☆23Updated 9 months ago
- Stronger and Faster Side-Channel Protections for CSIDH☆20Updated 5 years ago
- Open Cryptanalysis Platform☆11Updated last week
- Common MPC Pitfalls☆12Updated 3 months ago
- Rust library for cryptographic research☆150Updated last year
- A pure-Rust implementation of group operations on Ristretto and Curve25519☆29Updated last year
- Implementation of SoftSpokenOT. Forked from libOTe.☆10Updated last year
- Code for zero-knowledge middleboxes☆63Updated 3 years ago
- Formal Analysis of the PQXDH Protocol☆30Updated last year
- Reference implementations of post-quantum cryptographic primitives☆33Updated 5 months ago
- Implementation of cryptographic primitives in Go☆13Updated 2 years ago
- C++ implementation of VSS using LWE encryption and proofs☆15Updated 4 years ago
- Exploration of NIST post-quantum signatures on-ramp candidates☆37Updated 8 months ago