acmert / ntt-based-polmul
Python implementations of various NTT/INTT and NTT-based polynomial multiplication algorithms
☆30Updated 4 years ago
Related projects ⓘ
Alternatives and complementary repositories for ntt-based-polmul
- ☆24Updated 3 months ago
- Repo for code developed during the HEAT project (Homomorphic Encryption Applications Technology)☆55Updated 4 years ago
- ☆18Updated 2 years ago
- ☆23Updated 4 years ago
- This is code for homomorphic encryption scheme "a Full RNS variant of HEAAN"☆49Updated 6 years ago
- Saber and NTRU on M4 and AVX2☆16Updated 2 years ago
- ☆18Updated 3 weeks ago
- Acceleration of TFHE-based Homomorphic NAND Gate on FPGA☆14Updated 3 years ago
- A reading list for homomorphic encryption☆100Updated 3 months ago
- Intel Homomorphic Encryption Acceleration Library for FPGAs, including open source implementation of FPGA kernels for accelerating NTT, I…☆94Updated last year
- Number Theoretic Transform Implementation on GPU for FHE Applications☆36Updated 3 years ago
- ☆27Updated last year
- ☆17Updated 6 months ago
- Homomorphic Logistic Regression on Encrypted Data☆48Updated 5 years ago
- Team CEA-EPFL-Inpher: code for the iDash 2018 competition☆21Updated 6 years ago
- FPT: a Fixed-Point Accelerator for Torus Fully Homomorphic Encryption☆16Updated 3 months ago
- Python implementation of the Fully Homomorphic Encryption Scheme TFHE☆12Updated last year
- ☆33Updated 3 months ago
- ☆20Updated last year
- ☆10Updated last year
- Implementation of deep ResNet model on CKKS scheme in Microsoft SEAL library using multiplexed parallel convolution☆70Updated 2 years ago
- Hardware implementation of Saber☆7Updated 4 years ago
- Intel HEXL library backend for OpenFHE, which uses AVX-512 instructions to accelerate the execution of OpenFHE cryptographic capabilities…☆17Updated 4 months ago
- Simple Python implementation of BFV Homomorphic Encryption Scheme☆22Updated 3 years ago
- An Implementation of the Number Theoretic Transform☆37Updated last year
- Key recovery attacks against the CKKS homomorphic approximate encryption scheme☆14Updated 3 years ago
- ☆14Updated 2 months ago
- ☆39Updated 7 months ago
- ☆15Updated 6 years ago
- processor for post-quantum cryptography☆14Updated 4 years ago