acmert / ntt-based-polmulLinks
Python implementations of various NTT/INTT and NTT-based polynomial multiplication algorithms
☆37Updated 5 years ago
Alternatives and similar repositories for ntt-based-polmul
Users that are interested in ntt-based-polmul are comparing it to the libraries listed below
Sorting:
- Repo for code developed during the HEAT project (Homomorphic Encryption Applications Technology)☆61Updated 5 years ago
- ☆35Updated last year
- ☆26Updated 4 years ago
- Intel Homomorphic Encryption Acceleration Library for FPGAs, including open source implementation of FPGA kernels for accelerating NTT, I…☆105Updated 2 years ago
- ☆23Updated 3 years ago
- Griffinfly is COSIC's submission to the ZPRIZE competition under the category, Accelerating NTT Operations on an FPGA by Michiel Van Beir…☆11Updated 2 years ago
- FPT: a Fixed-Point Accelerator for Torus Fully Homomorphic Encryption☆25Updated last month
- This is code for homomorphic encryption scheme "a Full RNS variant of HEAAN"☆59Updated 6 years ago
- Parametric NTT/INTT Hardware Generator☆72Updated 4 years ago
- Acceleration of TFHE-based Homomorphic NAND Gate on FPGA☆17Updated 4 years ago
- ☆21Updated last month
- ☆20Updated last year
- ☆27Updated last month
- processor for post-quantum cryptography☆16Updated 5 years ago
- High-speed full CRYSTALS-DILITHIUM implementation on FPGA: Keygen, Sign, Verify.☆63Updated 2 years ago
- Number Theoretic Transform Implementation on GPU for FHE Applications☆43Updated 4 years ago
- Hardware implementation of polynomial multiplication operation of CRYSTALS-KYBER PQC scheme☆37Updated 3 years ago
- Polycircuit is an FHE components library built via FHERMA competitions☆18Updated 2 months ago
- A reading list for homomorphic encryption☆132Updated last month
- Saber and NTRU on M4 and AVX2☆18Updated 3 years ago
- ☆59Updated 4 years ago
- ☆28Updated last week
- A reading list for homomorphic encryption☆16Updated 2 years ago
- POC implementation of "Accelerating HE Operations Using Key Decomposition"[KLSS23]☆17Updated 3 months ago
- ☆12Updated last year
- Key recovery attacks against the CKKS homomorphic approximate encryption scheme☆17Updated 4 years ago
- Homomorphic Logistic Regression on Encrypted Data☆48Updated 6 years ago
- A Hardware Implemented Poseidon Hasher☆18Updated 3 years ago
- ☆26Updated 2 years ago
- ☆43Updated 10 months ago