☆20May 21, 2014Updated 11 years ago
Alternatives and similar repositories for jlbc
Users that are interested in jlbc are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- C++ Implementation of Multivariate Quadratic FHE☆52Oct 26, 2016Updated 9 years ago
- Software implementation of Gaussian sampling algorithms in C++ using NTL library.☆14Nov 6, 2015Updated 10 years ago
- Libraries for fully homomorphic encryption☆81Aug 24, 2016Updated 9 years ago
- Java implementation of NTRUEncrypt and NTRUSign☆120Mar 30, 2021Updated 5 years ago
- Prototype implementation of NTRUReEncrypt in Java☆12Apr 4, 2016Updated 10 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- An Implementation of the Fully Homomorphic Smart-Vercauteren Cryptosystem☆45Aug 26, 2015Updated 10 years ago
- AVX2 Chacha implementation☆16Nov 23, 2013Updated 12 years ago
- An implementation of the Skein hash function for ARMv7 with NEON☆14Nov 16, 2011Updated 14 years ago
- Optimized implementation of ring-TESLA☆11Aug 4, 2016Updated 9 years ago
- ☆100Jul 31, 2016Updated 9 years ago
- Proof-of-concept implementation of a homomorphic Simon encryption using YASHE and FV leveled homomorphic cryptosystems☆20Aug 8, 2015Updated 10 years ago
- The SonarQube plugin for jQAssistant☆15Updated this week
- Quick-n-dirty standalone Java implementation of ChaCha20 (256-bit key, 64- or 96-bit nonce)☆22Sep 25, 2020Updated 5 years ago
- Implementation of Brakerski's leveled homomorphic encryption system☆44Feb 12, 2017Updated 9 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Reference implementation of the BLZZRD variant of the BLISS Ring-LWE Signature Scheme☆17Oct 11, 2016Updated 9 years ago
- Symmetric somewhat homomorphic encryption library based on DGHV☆27Aug 8, 2017Updated 8 years ago
- masked, bit-sliced AES-128 demo code☆14Jan 10, 2025Updated last year
- This project is about applying k-anonymity principle to tables of relational data. Later on, the centralized algorithms will be modified …☆12Feb 12, 2013Updated 13 years ago
- SIDH C reference implementation☆13Jan 25, 2017Updated 9 years ago
- Implemention of Hierarchical Identity-Based Encryption☆24Dec 16, 2021Updated 4 years ago
- A Julia implementation of the Paillier partially homomorphic encryption system☆13Oct 8, 2020Updated 5 years ago
- Count Min Sketch implementation for Rust☆14Apr 13, 2026Updated 3 weeks ago
- ECC Basic Math Library for C, python and Go☆19Jan 24, 2024Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Self-contained educational implementation of the BLISS-B Bimodal Lattice Signature Scheme☆17Feb 26, 2016Updated 10 years ago
- Benchmark and comparison of secure Deep Learning platforms: TF Privacy, PySyft and TF-Encrypted☆10Mar 31, 2021Updated 5 years ago
- ☆15Oct 31, 2018Updated 7 years ago
- Implementation of a toolkit for ring-LWE based cryptography in arbitrary cyclotomic number fields.☆38Mar 3, 2016Updated 10 years ago
- Display your process vitals metrics☆10Sep 2, 2025Updated 8 months ago
- OWASP Annotated Application Verfication Standard☆17Mar 30, 2022Updated 4 years ago
- 简易Quartz集群管理工具☆11Apr 27, 2018Updated 8 years ago
- Arbitrary precision integers in TensorFlow☆11Dec 27, 2022Updated 3 years ago
- Yuan企业通用后台,快速实现微后台架构☆19Mar 7, 2018Updated 8 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Java implementation of the Vault(Hashicorp) API☆19Jul 8, 2016Updated 9 years ago
- ☆21Nov 30, 2019Updated 6 years ago
- Security oriented images for Docker☆17Nov 10, 2015Updated 10 years ago
- Lattice-based signature schemes☆11Nov 17, 2023Updated 2 years ago
- Post-quantum Wireguard (Theory)☆13Sep 9, 2020Updated 5 years ago
- Implementing use-based privacy for ubiquitous computing.☆18Jun 26, 2025Updated 10 months ago
- Implementation of the DGHV fully homomorphic encryption scheme☆131Mar 25, 2016Updated 10 years ago