arnomi / cryptocodeLinks
LaTeX package for typesetting pseudocode and cryptographic games
☆187Updated 2 years ago
Alternatives and similar repositories for cryptocode
Users that are interested in cryptocode are comparing it to the libraries listed below
Sorting:
- An attempt at a new LWE estimator☆318Updated 2 months ago
- CryptoBib BibTex files☆62Updated last month
- ☆236Updated 3 weeks ago
- A C++ library containing both easy-to-use lower level bigint/ecgroup interfaces and high-level cryptographical schemes/protocols.☆81Updated 2 months ago
- ☆183Updated 4 years ago
- Semi-honest Two Party Computation Based on Garbled Circuits.☆80Updated 3 weeks ago
- Multi-party Private Set Union☆18Updated 10 months ago
- Oblivious Transfer, Oblivious Transfer Extension and Variations☆179Updated 3 weeks ago
- An efficient, user-friendly, modular, and extensible framework for mixed-protocol secure multi-party computation with two or more parties☆91Updated 2 years ago
- Efficient Private Set Intersection base on VOLE☆135Updated 3 months ago
- A fast, portable, and easy to use Oblivious Transfer Library☆477Updated 2 months ago
- Crypto and networking utils used for ABY and OTExtension☆19Updated 4 years ago
- Repository for the SCALE-MAMBA MPC system☆263Updated 2 years ago
- Lattices in Cryptography (University of Michigan)☆107Updated last year
- C++ OT extension implementation☆128Updated 5 years ago
- Example implementation of the SealPIR protocol☆157Updated last year
- Library for performing Function Secret Sharing (FSS)☆94Updated 7 years ago
- The reference implementation of SimplePIR and DoublePIR, accompanying the paper "One Server for the Price of Two: Simple and Fast Single-…☆92Updated 2 years ago
- Homomorphic comparison in leveled homomorphic encryption and its applications☆38Updated 4 years ago
- Secure Computation Utilities☆15Updated 2 weeks ago
- Comprehensive Open Source Library for Secure Multiparty Computation☆188Updated 2 years ago
- A FRamework for Efficient Secure COmputation☆139Updated 9 months ago
- Authenticated Garbling and Efficient Maliciously Secure Two-Party Computation☆32Updated 3 weeks ago
- Implementation of SortingHat: Efficient Private Decision Tree Evaluation via Homomorphic Encryption and Transciphering.☆19Updated 3 years ago
- A two-party generator for Vector-OLE correlations.☆29Updated 4 years ago
- Efficient and Interactive Zero-Knowledge Proofs☆101Updated 3 weeks ago
- FLUTE: Fast and Secure Lookup Table Evaluations☆27Updated last year
- A sage Toolkit for mounting/estimating attacks on LWE with Side Information☆51Updated 2 years ago
- The fully homomorhic encryption scheme based on NTRU and LWE.☆48Updated last year
- Awesome list for cryptographic secure computation paper. This repo includes *Lattice*, *DifferentialPrivacy*, *MPC* and also a comprehens…☆219Updated 11 months ago