☆17May 23, 2024Updated last year
Alternatives and similar repositories for chalamet
Users that are interested in chalamet are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Extractable Witness Encryption for KZG Commitments☆32Nov 29, 2024Updated last year
- ☆15Updated this week
- ☆15Sep 1, 2025Updated 6 months ago
- Fast, High-Rate Single-Server PIR via FHE Composition☆38May 2, 2022Updated 3 years ago
- ☆16May 22, 2023Updated 2 years ago
- The repo of "Efficient 3PC for Binary Circuits with Application to Maliciously-Secure DNN Inference" (USENIX Security 2023)☆21Jun 27, 2023Updated 2 years ago
- ☆42Oct 19, 2021Updated 4 years ago
- Using folding schemes for a provable bitcoin light client☆34May 22, 2024Updated last year
- ☆25Apr 1, 2025Updated 11 months ago
- Verifiable FHE prototype☆27Aug 12, 2024Updated last year
- ☆12Sep 4, 2021Updated 4 years ago
- Implementation for the protocols described in https://eprint.iacr.org/2023/1700☆14Jan 9, 2025Updated last year
- ♥ ♥ ♥ Trevor's & Moxie's Axolotl Ratchet + AGL's xmpp-client ♥ ♥ ♥☆12Jan 27, 2015Updated 11 years ago
- Implements an encryptable machine (shapeCPU Java)☆11Aug 26, 2015Updated 10 years ago
- ☆33Feb 14, 2025Updated last year
- Semaphore v4 implemented in Rust☆10Oct 7, 2025Updated 5 months ago
- ☆11Aug 20, 2024Updated last year
- a hack implementation of CCS generic arithmetization, won a prize at Zuzalu hackathon 2023 despite incompleteness☆50Jul 5, 2023Updated 2 years ago
- A two-party generator for Vector-OLE correlations.☆31Jan 17, 2021Updated 5 years ago
- 🔑 Command-line wrapper around RustySecrets, a Rust implementation of threshold Shamir's secret sharing.☆10Apr 1, 2018Updated 7 years ago
- Piano: Extremely Simple, Single-server Private Information Retrieval with Sublinear Server Computation☆34Sep 25, 2024Updated last year
- ☆62Mar 17, 2026Updated last week
- MIDA: A Tool for Measuring the Internet☆20Mar 7, 2023Updated 3 years ago
- The reference implementation of SimplePIR and DoublePIR, accompanying the paper "One Server for the Price of Two: Simple and Fast Single-…☆99Jan 13, 2023Updated 3 years ago
- Created for Web3 builders☆32Mar 20, 2023Updated 3 years ago
- Where I create DAS Nodes that utilize a Secure Kademlia DHT Discv5 overlay☆16May 5, 2023Updated 2 years ago
- ProtoGalaxy folding scheme PoC implementation https://eprint.iacr.org/2023/1106.pdf☆41Sep 14, 2023Updated 2 years ago
- 🎄🖋 A Rust implementation of Merkle signing☆15Jul 10, 2020Updated 5 years ago
- Circuit PSI using garbled cuckoo filter☆11Dec 21, 2022Updated 3 years ago
- Prove multi-opens of EIP-4844 KZG blobs☆16Jun 15, 2023Updated 2 years ago
- A Risc-V CPU implemented as a zk-SNARK☆51Sep 4, 2022Updated 3 years ago
- First Trusted MCP server running on AWS Nitro Enclave Trusted Execution Environment☆16Apr 5, 2025Updated 11 months ago
- a CCA-secure module-lattice-based KEM☆17Dec 21, 2018Updated 7 years ago
- MerkleTree compatible with circomlib☆12Feb 24, 2026Updated last month
- Mastic: Private Weighted Heavy-Hitters and Attribute-Based Metrics☆12Nov 20, 2024Updated last year
- ☆23Jan 21, 2021Updated 5 years ago
- Groth16 zkSNARK bellman proof verifier using cloudflare/bn256 Pairing☆13Apr 22, 2020Updated 5 years ago
- ☆10Apr 5, 2017Updated 8 years ago
- The reference implementation of Tiptoe, accompanying the paper "Private web search with Tiptoe" (SOSP 2023).☆52Oct 1, 2023Updated 2 years ago