adecaro / jlbcLinks
☆20Updated 11 years ago
Alternatives and similar repositories for jlbc
Users that are interested in jlbc are comparing it to the libraries listed below
Sorting:
- XPIR: Private Information Retrieval for Everyone☆118Updated 4 years ago
- Proof-of-concept implementation of a homomorphic Simon encryption using YASHE and FV leveled homomorphic cryptosystems☆20Updated 10 years ago
- A bilinear pairing library for petlib☆39Updated 3 years ago
- Java implementation of NTRUEncrypt and NTRUSign☆120Updated 4 years ago
- A python library that implements a number of Privacy Enhancing Technolgies☆135Updated 3 years ago
- Implementation of Brakerski's leveled homomorphic encryption system☆44Updated 9 years ago
- Implementation of the DGHV fully homomorphic encryption scheme☆131Updated 9 years ago
- ☆26Updated 7 years ago
- A Flexible Efficient Secure Computation Backend☆33Updated 7 years ago
- HAL: A Library for Homomorphic Authentication☆22Updated 8 years ago
- The compiler for ObliVM☆65Updated 5 years ago
- Comprehensive Open Source Library for Secure Multiparty Computation☆188Updated 2 years ago
- Prototype implementation of Prio, a system for the private computation of aggregate statistics.☆64Updated 8 years ago
- Libraries for fully homomorphic encryption☆81Updated 9 years ago
- A Platform for Robust Threshold Cryptography based on Asynchronous Publicly Verifiable Secret Sharing with Tunable Security☆97Updated 3 years ago
- FairplayMP provides secure multiparty computation.☆46Updated 10 years ago
- Implementation of a pairing over a Barreto-Naehrig curve on top of OpenSSL.☆31Updated 10 years ago
- APRICOT: Advanced Protocols for Real-world Implementation of Computational Oblivious Transfers☆16Updated 9 years ago
- ☆38Updated 7 years ago
- NTT-based Fast Lattice library☆179Updated 3 years ago
- Implementation of ECDAA☆23Updated 8 years ago
- ☆52Updated 2 years ago
- (Inactive, see readme) Multiparty computation with SPDZ, MASCOT, and Overdrive offline phases☆222Updated 7 years ago
- PoC of an SGX enclave performing symmetric reencryption☆50Updated 9 years ago
- DEPRECATED – See NOTICE below about migration to new repository – Post-quantum key exchange from the ring learning with errors problem☆60Updated 9 years ago
- JHU Advanced Topics in Applied Cryptography (601.745)☆53Updated 7 years ago
- Self-contained educational implementation of the BLISS-B Bimodal Lattice Signature Scheme☆17Updated 9 years ago
- An Implementation of the Fully Homomorphic Smart-Vercauteren Cryptosystem☆45Updated 10 years ago
- Summation of 2 + 3 using Fully Homomorphic Encryption (HElib)☆11Updated 9 years ago
- ☆22Updated 9 years ago