Symmetric somewhat homomorphic encryption library based on DGHV
☆27Aug 8, 2017Updated 8 years ago
Alternatives and similar repositories for libshe
Users that are interested in libshe are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Implementation of Brakerski's leveled homomorphic encryption system☆44Feb 12, 2017Updated 9 years ago
- ☆11Mar 8, 2022Updated 4 years ago
- Number Geometry methods: Shortest Vector Problem and Shorter Basis Problem in Lattice (Hamming distance, Bounded distance decoding, bina…☆13May 19, 2023Updated 2 years ago
- Saratov State University, CSIT. Discipline "cryptographic methods of information security" (криптографические методы защиты информации, r…☆15Jun 28, 2018Updated 7 years ago
- A collection of Leech lattice decoders.☆12Nov 17, 2016Updated 9 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Classical simulator for Kuperberg's quantum collimation sieve, generalized to arbitrary finite cyclic groups and focused on CSIDH-512.☆14Jun 18, 2019Updated 6 years ago
- ☆20May 21, 2014Updated 11 years ago
- The compiler for ObliVM☆65Sep 1, 2020Updated 5 years ago
- ☆17Mar 11, 2026Updated last month
- ☆11May 24, 2017Updated 8 years ago
- Secure Logistic Regression based on Homomorphic Encryption☆43Aug 2, 2019Updated 6 years ago
- ☆19Mar 24, 2017Updated 9 years ago
- Ghost port of the open-source jekyll theme, dbyll.☆16Aug 14, 2014Updated 11 years ago
- ☆100Jul 31, 2016Updated 9 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Implementation of the DGHV fully homomorphic encryption scheme☆131Mar 25, 2016Updated 10 years ago
- P2P chat powered by webrtc in a terminal☆19Nov 3, 2016Updated 9 years ago
- An Implementation of Order-Revealing Encryption☆100Aug 31, 2020Updated 5 years ago
- Supporting data for BAD TRAFFIC Citizen Lab report.☆23Mar 8, 2018Updated 8 years ago
- Monomi designer and planner prototype☆14Feb 16, 2015Updated 11 years ago
- Code for the ICML 2021 paper "Sharing Less is More: Lifelong Learning in Deep Networks with Selective Layer Transfer"☆12Aug 17, 2021Updated 4 years ago
- ☆12Sep 11, 2020Updated 5 years ago
- ☆10Feb 13, 2017Updated 9 years ago
- An experimental Chord implement for decentralized, serverless applications on browsers☆17Apr 17, 2021Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆15Apr 6, 2016Updated 10 years ago
- BlindDB: an Encrypted, Distributed, and Searchable Key-value Store☆10Oct 10, 2017Updated 8 years ago
- Rose (n-way) trees with both upwards- (i.e. cached) and downwards-traveling (i.e. accumulating) monoidal annotations.☆16Apr 18, 2026Updated 3 weeks ago
- AWS Lambda powered drop-in replacement for ImageMagick convert command line tool☆11Oct 25, 2025Updated 6 months ago
- A graphics tracing and replay framework to explore system-level effects on heterogeneous CPU+GPU memory systems.☆15Apr 16, 2018Updated 8 years ago
- FPGA related files for ORAM☆14Sep 23, 2015Updated 10 years ago
- CVE-2015-2231 POC☆10Sep 8, 2015Updated 10 years ago
- Repo for the implementation of the isogeny based signature scheme CSI-FiSh☆26Jun 24, 2023Updated 2 years ago
- First edition of the annual beginner CTF by havce.☆13Dec 18, 2022Updated 3 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Template for LaTeX beamer slides using #uulm corporate design.☆15Dec 3, 2022Updated 3 years ago
- Symmetric Partial Homomorphic Encryption☆15Oct 13, 2020Updated 5 years ago
- WebCryptoAPI polyfil to work in Node.js in the Browser (so that you don't have to be concerned about moving crypto code between a browser…☆25May 7, 2020Updated 6 years ago
- Using CVE-2013-6282 to bypass Samsung kernel module authentication☆13Dec 21, 2013Updated 12 years ago
- specs & benchmarks for the ZPrize 3 - High Throughput Signature Verification☆10Oct 9, 2023Updated 2 years ago
- ☆12Sep 11, 2024Updated last year
- Membership Inference Attack against Graph Neural Networks☆12Nov 9, 2022Updated 3 years ago