☆20May 21, 2014Updated 11 years ago
Alternatives and similar repositories for jlbc
Users that are interested in jlbc are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- C++ Implementation of Multivariate Quadratic FHE☆51Oct 26, 2016Updated 9 years ago
- Software implementation of Gaussian sampling algorithms in C++ using NTL library.☆14Nov 6, 2015Updated 10 years ago
- Libraries for fully homomorphic encryption☆81Aug 24, 2016Updated 9 years ago
- Java implementation of NTRUEncrypt and NTRUSign☆120Mar 30, 2021Updated 4 years ago
- Prototype implementation of NTRUReEncrypt in Java☆12Apr 4, 2016Updated 9 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- An Implementation of the Fully Homomorphic Smart-Vercauteren Cryptosystem☆45Aug 26, 2015Updated 10 years ago
- AVX2 Chacha implementation☆16Nov 23, 2013Updated 12 years ago
- An implementation of the Skein hash function for ARMv7 with NEON☆14Nov 16, 2011Updated 14 years ago
- Optimized implementation of ring-TESLA☆11Aug 4, 2016Updated 9 years ago
- Proof-of-concept implementation of a homomorphic Simon encryption using YASHE and FV leveled homomorphic cryptosystems☆20Aug 8, 2015Updated 10 years ago
- The SonarQube plugin for jQAssistant☆15Mar 13, 2026Updated last week
- Quick-n-dirty standalone Java implementation of ChaCha20 (256-bit key, 64- or 96-bit nonce)☆22Sep 25, 2020Updated 5 years ago
- Reference implementation of the BLZZRD variant of the BLISS Ring-LWE Signature Scheme☆17Oct 11, 2016Updated 9 years ago
- Symmetric somewhat homomorphic encryption library based on DGHV☆27Aug 8, 2017Updated 8 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Implementation of cryptographic program obfuscation☆42Feb 8, 2018Updated 8 years ago
- masked, bit-sliced AES-128 demo code☆14Jan 10, 2025Updated last year
- A Python implementation of the threshold variant of the Damgard-Jurik cryptosystem.☆15May 4, 2021Updated 4 years ago
- SSE optimized version of SHA256, doing four blocks in parallel☆25Sep 22, 2010Updated 15 years ago
- SIDH C reference implementation☆13Jan 25, 2017Updated 9 years ago
- Implemention of Hierarchical Identity-Based Encryption☆24Dec 16, 2021Updated 4 years ago
- A Julia implementation of the Paillier partially homomorphic encryption system☆13Oct 8, 2020Updated 5 years ago
- Self-contained educational implementation of the BLISS-B Bimodal Lattice Signature Scheme☆17Feb 26, 2016Updated 10 years ago
- Modern Dependency Management☆63Dec 23, 2015Updated 10 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- AWS Lambda powered drop-in replacement for ImageMagick convert command line tool☆11Oct 25, 2025Updated 5 months ago
- Benchmark and comparison of secure Deep Learning platforms: TF Privacy, PySyft and TF-Encrypted☆10Mar 31, 2021Updated 4 years ago
- Implementation and evaluation data of the Concolic Walk heuristic for solving complex arithmetic path conditions.☆13Jul 11, 2014Updated 11 years ago
- 基站定位的安卓程序,实现了:1.获取手机连接的基站编号,2.根据基站编号获取经纬度,3.根据经纬度获取地址☆20Jul 31, 2013Updated 12 years ago
- 简易Quartz集群管理工具☆11Apr 27, 2018Updated 7 years ago
- Arbitrary precision integers in TensorFlow☆11Dec 27, 2022Updated 3 years ago
- ModbusTCP Fuzzing and DoS Tool.☆11Aug 8, 2020Updated 5 years ago
- Yuan企业通用后台,快速实现微后台架构☆19Mar 7, 2018Updated 8 years ago
- This is a docker images of Ubuntu 16.04 LTS with apache2 and php7☆15Jun 5, 2022Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆21Nov 30, 2019Updated 6 years ago
- Lattice-based signature schemes☆11Nov 17, 2023Updated 2 years ago
- Java implementation of 3GPP™ TS 35.206 Milenage algorithm☆13Oct 15, 2016Updated 9 years ago
- Implementing use-based privacy for ubiquitous computing.☆18Jun 26, 2025Updated 8 months ago
- Post-quantum Wireguard (Theory)☆13Sep 9, 2020Updated 5 years ago
- Implementation of the DGHV fully homomorphic encryption scheme☆131Mar 25, 2016Updated 10 years ago
- Yopass CLI☆15Jan 13, 2026Updated 2 months ago