arnomi / cryptocodeLinks
LaTeX package for typesetting pseudocode and cryptographic games
☆182Updated last year
Alternatives and similar repositories for cryptocode
Users that are interested in cryptocode are comparing it to the libraries listed below
Sorting:
- CryptoBib BibTex files☆60Updated 2 weeks ago
- An attempt at a new LWE estimator☆301Updated 2 weeks ago
- ☆182Updated 4 years ago
- A C++ library containing both easy-to-use lower level bigint/ecgroup interfaces and high-level cryptographical schemes/protocols.☆80Updated last week
- ☆229Updated 7 months ago
- Multi-party Private Set Union☆18Updated 7 months ago
- Crypto and networking utils used for ABY and OTExtension☆19Updated 4 years ago
- Semi-honest Two Party Computation Based on Garbled Circuits.☆79Updated 3 years ago
- An efficient, user-friendly, modular, and extensible framework for mixed-protocol secure multi-party computation with two or more parties☆88Updated 2 years ago
- Homomorphic comparison in leveled homomorphic encryption and its applications☆39Updated 4 years ago
- C++ OT extension implementation☆128Updated 4 years ago
- Efficient Private Set Intersection base on VOLE☆132Updated 2 weeks ago
- Repository for the SCALE-MAMBA MPC system☆263Updated 2 years ago
- Fast, High-Rate Single-Server PIR via FHE Composition☆35Updated 3 years ago
- Library for performing Function Secret Sharing (FSS)☆93Updated 6 years ago
- A sage Toolkit for mounting/estimating attacks on LWE with Side Information☆49Updated 2 years ago
- Oblivious Transfer, Oblivious Transfer Extension and Variations☆176Updated last month
- Comprehensive Open Source Library for Secure Multiparty Computation☆186Updated 2 years ago
- The Pairing-based Crypto library☆259Updated last month
- Secure Computation Utilities☆14Updated 3 weeks ago
- Implementation of a toolkit for ring-LWE based cryptography in arbitrary cyclotomic number fields.☆37Updated 9 years ago
- A fast, portable, and easy to use Oblivious Transfer Library☆473Updated 2 weeks ago
- Lattices in Cryptography (University of Michigan)☆95Updated 11 months ago
- Efficient and Interactive Zero-Knowledge Proofs☆97Updated last year
- Example implementation of the SealPIR protocol☆152Updated 9 months ago
- Implementation of some SSE schemes, including Sophos, Diana and Janus☆101Updated 4 years ago
- A two-party generator for Vector-OLE correlations.☆29Updated 4 years ago
- SpOT-Light: Lightweight Private Set Intersection from Sparse OT Extension (CRYPTO 2019)☆35Updated 3 years ago
- Implementation of SortingHat: Efficient Private Decision Tree Evaluation via Homomorphic Encryption and Transciphering.☆19Updated 3 years ago
- A two-party secure function evaluation using Yao's garbled circuit protocol☆77Updated last year