Secure Computation Utilities
☆16Feb 2, 2026Updated 3 weeks ago
Alternatives and similar repositories for secure-computation-library
Users that are interested in secure-computation-library are comparing it to the libraries listed below
Sorting:
- A C++ implementation of the DUPLO cryptographic protocol☆22Jun 5, 2017Updated 8 years ago
- Algorithms used in cryptography, an academic introduction☆20Nov 14, 2020Updated 5 years ago
- ☆25Updated this week
- Input scripts for securely evaluating quantized ImageNet models with mp-spdz☆19Oct 6, 2020Updated 5 years ago
- Implementation of protocols in the paper titled "Scalable Multi-Party Computation Protocols for Machine Learning in the Honest-Majority S…☆31Feb 15, 2025Updated last year
- Private Inference on Transformer☆30Jun 13, 2023Updated 2 years ago
- Open Cryptanalysis Platform☆13Feb 7, 2026Updated 3 weeks ago
- Masked implementations of PQ schemes for the Cortex-M4.☆13Nov 18, 2025Updated 3 months ago
- Semaphore Protocol with Noir.☆11Mar 14, 2025Updated 11 months ago
- ☆12Oct 4, 2023Updated 2 years ago
- Multi-party computation utilities toolkit for rust☆16Dec 19, 2019Updated 6 years ago
- ☆10Mar 11, 2024Updated last year
- Automated benchmarking and testing of Post-Quantum Public Key Algoritms (work in progress)☆12Jul 27, 2018Updated 7 years ago
- ☆45May 7, 2025Updated 9 months ago
- An interactive notebook for understanding the relation between mutual information, perceived and hypothetical information☆11Feb 28, 2020Updated 6 years ago
- The repo of "Coral: Maliciously Secure Computation Framework for Packed and Mixed Circuits" (CCS 2024)☆12Sep 6, 2024Updated last year
- ☆12May 17, 2025Updated 9 months ago
- ECDLP solver with hardware acceleration of GPU.☆18Mar 5, 2025Updated 11 months ago
- SecureML Introduction☆10Aug 12, 2023Updated 2 years ago
- implementation of seren☆12Dec 8, 2024Updated last year
- This is the repository for the first-order masked Kyber on ARM Cortex-M4☆17Nov 2, 2023Updated 2 years ago
- Publicly Verifiable & Private Collaborative ML Model Training in Noir☆13Feb 17, 2025Updated last year
- ☆52May 12, 2023Updated 2 years ago
- Repository containing code accompanying the paper "Aggregating Falcon Signatures With LaBRADOR".☆14May 26, 2024Updated last year
- Tornado is a compiler producing masked bitsliced implementations proven secure in the bit/register probing model☆18Mar 14, 2021Updated 4 years ago
- CryptoBib BibTex files☆62Feb 18, 2026Updated last week
- 🌱 A decentralized social media app built with event streams and Dataverse file system☆15Dec 8, 2023Updated 2 years ago
- BLS signature implementation on the BLS12-381 curve that meets the IETF spec.☆17Feb 3, 2026Updated 3 weeks ago
- Open Source Implemenation of Secure SEV-SNP bootup workflow☆26Nov 3, 2024Updated last year
- Simple C++ reader for CIFAR-10 dataset☆17Apr 29, 2023Updated 2 years ago
- List of providers for used in the ZKP2P PeerAuth extension☆18Updated this week
- AES Galois Extended Mode☆23Feb 9, 2026Updated 2 weeks ago
- A C++ implementation of the TinyLEGO cryptographic protocol [NST17] for general secure two-party computation☆16Jun 4, 2017Updated 8 years ago
- Vector OLE and zero-knowledge for Z2k. https://ia.cr/2022/819☆17Mar 10, 2023Updated 2 years ago
- Faster Montgomery and Joye ladder formulas for short Weierstrass elliptic curves☆22Jul 1, 2020Updated 5 years ago
- Our first MPC program (aka: MP-SPDZ by a dummy)☆18Nov 13, 2023Updated 2 years ago
- Empirical Study of the Prominence of Zero-Knowledge Proof (ZKP) Languages☆22Aug 6, 2025Updated 6 months ago
- BAT KEM/Signature Reference Implementation☆23Dec 28, 2021Updated 4 years ago
- Shamir Secret Sharing☆21Nov 27, 2019Updated 6 years ago