bristolcrypto / HEAT
☆26Updated 6 years ago
Related projects ⓘ
Alternatives and complementary repositories for HEAT
- Library implementing the Fan-Vercauteren homomorphic encryption scheme☆59Updated 8 years ago
- (Inactive, see readme) Multiparty computation with SPDZ, MASCOT, and Overdrive offline phases☆215Updated 5 years ago
- XPIR: Private Information Retrieval for Everyone☆115Updated 3 years ago
- A C++ implementation of the TinyLEGO cryptographic protocol [NST17] for general secure two-party computation☆16Updated 7 years ago
- ☆48Updated 7 years ago
- Implementation of a toolkit for ring-LWE based cryptography in arbitrary cyclotomic number fields.☆35Updated 8 years ago
- Repository and website for the Estimate all the {LWE, NTRU} schemes! code and paper.☆23Updated 6 years ago
- CUDA Homomorphic Encryption Library☆193Updated 7 years ago
- Rust implementation of the BMR16 arithmetic garbling scheme.☆34Updated 4 years ago
- Multi-Key Homomophic Encryption from TFHE☆55Updated 3 years ago
- Implementation of Brakerski's leveled homomorphic encryption system☆41Updated 7 years ago
- NTT-based Fast Lattice library☆167Updated 2 years ago
- Proof-of-concept implementation of a homomorphic Simon encryption using YASHE and FV leveled homomorphic cryptosystems☆18Updated 9 years ago
- C++ OT extension implementation☆125Updated 3 years ago
- ☆39Updated 6 months ago
- Repo for the implementation of the isogeny based signature scheme CSI-FiSh☆23Updated last year
- ☆50Updated last year
- CryptoBib BibTex files☆51Updated 2 weeks ago
- Implementation of Valiant's universal circuit construction optimized for private function evaluation☆39Updated 3 years ago
- Pure Python Paillier Homomorphic Cryptosystem☆131Updated 6 years ago
- TinyGarble: Logic Synthesis and Sequential Descriptions for Yao's Garbled Circuits☆120Updated 11 months ago
- Implementation of the DGHV fully homomorphic encryption scheme☆127Updated 8 years ago
- Comprehensive Open Source Library for Secure Multiparty Computation☆180Updated last year
- A C++ implementation of the DUPLO cryptographic protocol☆22Updated 7 years ago
- Proof-of-concept implementation of an identity-based encryption scheme over NTRU lattices☆43Updated 8 years ago
- Companion repository for blog post on benchmarking implementations of Paillier encryption☆19Updated 7 years ago
- An implementation of the LowMC block cipher family.☆24Updated 6 years ago
- ☆48Updated 4 years ago
- Malicious Two Party Computation Based on Garbled Circuits.☆12Updated 4 years ago
- Some algorithms for computation on encrypted data based on Microsoft SEAL☆27Updated 4 years ago