☆20May 21, 2014Updated 11 years ago
Alternatives and similar repositories for jlbc
Users that are interested in jlbc are comparing it to the libraries listed below
Sorting:
- An implementation of Brakerski et al's "Fully homomorphic encryption without bootstrapping"☆11Apr 29, 2013Updated 12 years ago
- Prototype implementation of NTRUReEncrypt in Java☆12Apr 4, 2016Updated 9 years ago
- C++ Implementation of Multivariate Quadratic FHE☆51Oct 26, 2016Updated 9 years ago
- Software implementation of Gaussian sampling algorithms in C++ using NTL library.☆14Nov 6, 2015Updated 10 years ago
- Libraries for fully homomorphic encryption☆81Aug 24, 2016Updated 9 years ago
- An Implementation of the Fully Homomorphic Smart-Vercauteren Cryptosystem☆45Aug 26, 2015Updated 10 years ago
- Proof-of-concept implementation of a homomorphic Simon encryption using YASHE and FV leveled homomorphic cryptosystems☆20Aug 8, 2015Updated 10 years ago
- Implementation of Brakerski's leveled homomorphic encryption system☆44Feb 12, 2017Updated 9 years ago
- Implemention of Hierarchical Identity-Based Encryption☆24Dec 16, 2021Updated 4 years ago
- Java implementation of NTRUEncrypt and NTRUSign☆120Mar 30, 2021Updated 4 years ago
- Symmetric somewhat homomorphic encryption library based on DGHV☆27Aug 8, 2017Updated 8 years ago
- ☆100Jul 31, 2016Updated 9 years ago
- Implementation of cryptographic program obfuscation☆42Feb 8, 2018Updated 8 years ago
- ☆15Oct 31, 2018Updated 7 years ago
- EDHOC (RFC 9528): Lightweight authenticated key exchange in C for IoT and constrained devices☆14Updated this week
- ModbusTCP Fuzzing and DoS Tool.☆11Aug 8, 2020Updated 5 years ago
- AppCoins is a blockchain-based protocol for the App Economy supported by the Aptoide App Store, and the first ICO serving 200 million us…☆12May 22, 2018Updated 7 years ago
- Exercises in Privacy Enhancing Technologies (UCL Information Security MSc; Course COMPGA17)☆40Apr 9, 2020Updated 5 years ago
- Implementation of a toolkit for ring-LWE based cryptography in arbitrary cyclotomic number fields.☆38Mar 3, 2016Updated 10 years ago
- GooSig: short signatures from RSA that hide the signer's RSA public key☆12Jan 8, 2020Updated 6 years ago
- Lattice-based signature schemes☆11Nov 17, 2023Updated 2 years ago
- ☆10May 10, 2016Updated 9 years ago
- A privacy-preserving digital version of punch cards used in store loyalty programs☆11Apr 19, 2021Updated 4 years ago
- NTT-based Fast Lattice library☆179Oct 14, 2022Updated 3 years ago
- Implementation of the DGHV fully homomorphic encryption scheme☆131Mar 25, 2016Updated 9 years ago
- ☆12Jun 25, 2021Updated 4 years ago
- AWS Lambda powered drop-in replacement for ImageMagick convert command line tool☆11Oct 25, 2025Updated 4 months ago
- Small repo for implementing the 2018 EUROCRYPT paper "Simple Proofs of Sequential Work" by Cohen and Pietrzak. Also used as part of our C…☆10Aug 26, 2018Updated 7 years ago
- Misuse cases of Cryptography in real world software products☆12Nov 4, 2018Updated 7 years ago
- TLS WG Wiki☆13Jan 16, 2026Updated last month
- This version of VLC is suitable with ns3 version 3.25. Please dont use an older version than the specified one.☆10Apr 3, 2017Updated 8 years ago
- Efficient zero-knowledge arguments in the discrete log setting, revisited☆16Mar 4, 2020Updated 6 years ago
- Hackathon project for Snarky workshop.☆11Jun 21, 2019Updated 6 years ago
- Display your process vitals metrics☆10Sep 2, 2025Updated 6 months ago
- ☆10Oct 22, 2019Updated 6 years ago
- Github老玩家自己搭的服务器,老飞飞原版,可联机-天马座☆11May 14, 2019Updated 6 years ago
- ☆13Feb 23, 2026Updated last week
- A Python simulator used to model cross shard transaction strategies for Ethereum 2.0☆11May 3, 2024Updated last year
- Google Tink's critical Ed25519 bug related to Java "final" keyword☆11Apr 5, 2020Updated 5 years ago