baonq-me / bgnView external linksLinks
Somewhat homomorphic encryption over elliptic curve using BGN cryptosystem
☆12May 7, 2022Updated 3 years ago
Alternatives and similar repositories for bgn
Users that are interested in bgn are comparing it to the libraries listed below
Sorting:
- This Projects has implemented three asymmetric and homomorphic encryption BGN, Benaloh, Paillier in Java using JPBC library.☆10Dec 27, 2019Updated 6 years ago
- BGN encryption scheme implementation using Go☆16Sep 5, 2020Updated 5 years ago
- Implementation of a Threshold Paillier Cryptosystem distributed key generation protocol☆12Sep 15, 2025Updated 4 months ago
- Decentralized Asynchronous Training on Heterogeneous Devices☆10Nov 11, 2025Updated 3 months ago
- Secure Interrogation of Genomic Databases (SIG-DB) using Homomorphic Encryption☆10May 16, 2018Updated 7 years ago
- Balanced K-means in Pytorch with strong GPU acceleration☆12Apr 30, 2020Updated 5 years ago
- Symmetric Homomorphic Encryption☆10Jul 26, 2022Updated 3 years ago
- ☆11May 17, 2021Updated 4 years ago
- Quá trình tìm hiểu Openstack☆13Jun 24, 2022Updated 3 years ago
- This repository contains the implementation of DPMLBench: Holistic Evaluation of Differentially Private Machine Learning☆11Nov 24, 2023Updated 2 years ago
- sample code test here☆11Apr 14, 2024Updated last year
- Linear-complexity Private Function Evaluation (PFE) based on homomorphic encryption (as presented at ESORICS'20).☆10Sep 14, 2020Updated 5 years ago
- Implementation for iris biometric template protection based on NTRU homomorphic encryption.☆11Dec 20, 2021Updated 4 years ago
- End-to-End Gradient Inversion (Gradient Leakage in Federated Learning) 【https://ieeexplore.ieee.org/document/9878027】☆12Aug 19, 2022Updated 3 years ago
- Record some of my tools, not limited to language☆12Jan 3, 2016Updated 10 years ago
- How to backdoor Diffie-Hellman, lessons learned from the Socat non-prime prime☆11Jun 29, 2021Updated 4 years ago
- ☆10Mar 24, 2020Updated 5 years ago
- A Golang API for TheHive☆13Sep 3, 2020Updated 5 years ago
- Counter-Strike: Source Sound Files☆26Jul 19, 2019Updated 6 years ago
- Privacy-preserving k-means clustering on data owned by multiple parties☆14May 10, 2016Updated 9 years ago
- 《统计学习方法_李航》每章算法的具体实现(不依赖与其他库)☆11Feb 20, 2017Updated 8 years ago
- Benchmarking code for evaluating the cost of cache coherence protocols implemented on different platforms☆14Apr 13, 2021Updated 4 years ago
- This project consists of implementations of several kNN algorithms for road networks (aka finding nearest points of interest) and the exp…☆11Apr 30, 2024Updated last year
- Truth Discovery in DBG@SUSTech☆13May 13, 2021Updated 4 years ago
- SHA-3 Keccak sponge function implemented in Python☆11Oct 3, 2012Updated 13 years ago
- 基于phe库的安全多方计算协议实现☆11Jun 1, 2022Updated 3 years ago
- A Python implementation of the non_iid tests in SP800-90B.☆13Aug 2, 2021Updated 4 years ago
- ☆12Apr 10, 2020Updated 5 years ago
- This module provides access to information of slab usage for nginx shared memory☆13Aug 30, 2017Updated 8 years ago
- Symmetric Partial Homomorphic Encryption☆15Oct 13, 2020Updated 5 years ago
- Stanford Cryptography class excercises☆20May 13, 2012Updated 13 years ago
- Testprogram for libre and librem☆11Oct 20, 2021Updated 4 years ago
- Client side encryption plugin for Opensearch☆16Jan 14, 2026Updated last month
- A Python implementation of the threshold variant of the Damgard-Jurik cryptosystem.☆15May 4, 2021Updated 4 years ago
- CloudCryptoSearch is a searchable encryption middleware, allowing the storage, update, and ranked multi-keyword searching of encrypted te…☆12Oct 31, 2023Updated 2 years ago
- Contains Packages for ElGamal, Paillier, Goldweiser-Micali and DGK Homomorphic Encryption System. Also implements secure multiplication, …☆58Sep 14, 2025Updated 5 months ago
- ☆54Apr 5, 2022Updated 3 years ago
- ☆13Jun 11, 2021Updated 4 years ago
- Nền tảng server nhỏ nhắn, dễ thương :*☆15Jul 31, 2015Updated 10 years ago