C++ Library for Mobile Private Contact Discovery
☆27Mar 25, 2021Updated 4 years ago
Alternatives and similar repositories for mobile_psi_cpp
Users that are interested in mobile_psi_cpp are comparing it to the libraries listed below
Sorting:
- Optimized implementation of the Picnic signature scheme☆83Sep 2, 2022Updated 3 years ago
- An implementation of "The Simplest Oblivious Transfer Protocol"☆27Nov 13, 2018Updated 7 years ago
- A repository for private set intersection.☆186Dec 23, 2024Updated last year
- ☆19Feb 3, 2026Updated last month
- ☆35Oct 21, 2020Updated 5 years ago
- Circuit PSI using garbled cuckoo filter☆11Dec 21, 2022Updated 3 years ago
- A two-party generator for Vector-OLE correlations.☆31Jan 17, 2021Updated 5 years ago
- A fast, portable, and easy to use Oblivious Transfer Library☆488Jan 26, 2026Updated last month
- library providing OPRF and Threshold OPRF based on libsodium☆32Feb 23, 2026Updated last month
- collection of used Tools for CTFs☆15Oct 24, 2021Updated 4 years ago
- A research project on isomorphisms of finite fields☆16Jun 15, 2018Updated 7 years ago
- Implementation of cryptographic primitives in Go☆13Mar 13, 2023Updated 3 years ago
- A Cuckoo filter implementation in Python☆14Aug 9, 2022Updated 3 years ago
- Implementation of https://www.ietf.org/archive/id/draft-denis-aegis-aead-00.html / https://competitions.cr.yp.to/round3/aegisv11.pdf☆15Mar 25, 2025Updated 11 months ago
- Implementations of Private Set Intersection Protocols☆188Jun 27, 2025Updated 8 months ago
- A pure-go implementation of the Axolotl Ratchet, extracted from pond☆21Feb 8, 2017Updated 9 years ago
- Small, self-contained C implementation of Ristretto255 based on libdecaf☆13Apr 4, 2019Updated 6 years ago
- Anonymous Credit Tokens implementation in Rust☆26Mar 2, 2026Updated 2 weeks ago
- Elgamal Encryption using Elliptic Curve Cryptography in Python 2.7☆13Nov 17, 2018Updated 7 years ago
- ☆10Apr 10, 2020Updated 5 years ago
- Private Information Retrieval protocol☆45Apr 3, 2021Updated 4 years ago
- Anonymous usage tokens from curve trees☆25Mar 28, 2025Updated 11 months ago
- An implementation of the LowMC block cipher family.☆27Nov 29, 2017Updated 8 years ago
- Org export engine for Jekyll on Markdown☆12May 12, 2022Updated 3 years ago
- ☆17Mar 3, 2024Updated 2 years ago
- JoyID docs☆18Apr 11, 2025Updated 11 months ago
- A python library providing several polynomial-based Private Set Intersection protocols.☆46Oct 19, 2014Updated 11 years ago
- The implementation of "Efficient Scalable Multi-Party Private Set Intersection(-Variants) from Bicentric Zero-Sharing"☆18Aug 20, 2025Updated 7 months ago
- A lecture on quantum computing and symmetric-key cryptography at Chinese Academy of Sciences☆15Nov 19, 2020Updated 5 years ago
- Code of Round5☆11May 4, 2020Updated 5 years ago
- Proof of concept code for running RLWE schemes on long integer multiplier co-processors☆20Nov 26, 2021Updated 4 years ago
- An easy-to-use, general and open-source tool to solve the guess-and-determine problem☆31Feb 25, 2026Updated 3 weeks ago
- Lattices and Their Algorithms, Leiden, Spring 2024☆23Aug 13, 2024Updated last year
- Pythia server (prototype) implementation☆13Nov 8, 2018Updated 7 years ago
- ISO 8583 file parser☆15Jun 15, 2022Updated 3 years ago
- ☆241Mar 12, 2026Updated last week
- 基于信誉共识和联邦学习的异构车联网交通预测与规划☆12Sep 4, 2023Updated 2 years ago
- Stay updated with the latest deadlines for top Multi-Party Computation (MPC) events, including conferences, journals, and workshops. Neve…☆21Mar 9, 2026Updated 2 weeks ago
- OPAQUE asymmetric PAKE, and its threshold implementation. Experimental, not audited.☆17Jun 16, 2021Updated 4 years ago