billbuchanan / esecurity
MSc Module
☆59Updated 4 years ago
Alternatives and similar repositories for esecurity
Users that are interested in esecurity are comparing it to the libraries listed below
Sorting:
- MSc module in Applied Cryptography - CSN11131☆66Updated 3 weeks ago
- A curated list of resources about post-quantum cryptography☆287Updated 7 months ago
- A C++ implementation of the TinyLEGO cryptographic protocol [NST17] for general secure two-party computation☆16Updated 7 years ago
- JHU Advanced Topics in Applied Cryptography (601.745)☆52Updated 7 years ago
- FrodoKEM: Learning with Errors Key Encapsulation. FrodoKEM is a family of key-encapsulation mechanisms that are designed to be conservati…☆135Updated 5 months ago
- Deployments of fancy cryptography☆142Updated 2 weeks ago
- Falcon: Fast-Fourier Lattice-based Compact Signatures over NTRU - NIST PQC Digital Signature Algorithm☆29Updated last year
- Quantum-resistent asymmetric key generation tool for digital signatures.☆21Updated 5 years ago
- A cheat sheet for the new post quantum cryptography algorithms☆21Updated 3 months ago
- Supersingular Isogeny-Based Cryptography constructions (python-code library)☆50Updated 2 years ago
- FourQlib is an efficient and portable cryptographic library that provides functions for computing elliptic curve based operations on the …☆85Updated 2 years ago
- Comprehensive Open Source Library for Secure Multiparty Computation☆185Updated last year
- A tiny, educational library for secure multi-party computation (in pure Python).☆89Updated 2 years ago
- rabe is an Attribute Based Encryption library, written in Rust☆84Updated 2 months ago
- ☆68Updated 5 months ago
- ☆49Updated 2 years ago
- SageMath library for constructing elliptic curves☆69Updated last year
- ☆11Updated last year
- Signature scheme submitted to NIST's Post-Quantum Cryptography Project☆76Updated 7 years ago
- Exploration of NIST post-quantum signatures on-ramp candidates☆31Updated 2 months ago
- ☆457Updated 6 months ago
- Hashing to Elliptic Curves☆81Updated 8 months ago
- BGN encryption scheme implementation using Go☆16Updated 4 years ago
- Functional encryption library in C☆84Updated 4 years ago
- This is my personal (big) recopilation about cryptanalysis, crypto tools and challenges☆76Updated last year
- Secure distributed dataflow framework for encrypted machine learning and data processing☆65Updated last year
- A list of the state of IETF protocols and PQC☆58Updated 3 months ago
- A curated list of SGX code and resources.☆242Updated 11 months ago
- Zero-Knowledge Swiss Knife☆94Updated 2 years ago
- Global-Scale Secure Multiparty Computation☆44Updated 2 years ago