A Language and Compiler for Homomorphic Encryption Made easY
☆68Jun 1, 2020Updated 5 years ago
Alternatives and similar repositories for ALCHEMY
Users that are interested in ALCHEMY are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆14Feb 11, 2022Updated 4 years ago
- Λ ⚬ λ: Functional Lattice Cryptography☆233Mar 22, 2021Updated 5 years ago
- ☆29Dec 11, 2018Updated 7 years ago
- proof of concepts and experimental code for TFHE☆21Feb 18, 2020Updated 6 years ago
- ☆26Aug 10, 2018Updated 7 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Proof combinators used in Liquid Haskell for theorem proving☆12Mar 28, 2018Updated 8 years ago
- Type level algebraic "proofs" using lens combinators☆19Jul 26, 2019Updated 6 years ago
- ☆22Oct 1, 2018Updated 7 years ago
- ☆16Mar 26, 2026Updated 2 weeks ago
- Files for the tutorial "Correct-by-construction programming in Agda" at POPL '19 in Cascais☆26Jan 14, 2019Updated 7 years ago
- A simple ML dialect☆10Jan 2, 2017Updated 9 years ago
- A library for lattice-based homomorphic encryption in Go☆14May 15, 2022Updated 3 years ago
- Extensible, Type Safe Error Handling in Haskell☆13Dec 22, 2020Updated 5 years ago
- Proofs of the number of inhabitants of polymorphic functions☆23Jul 19, 2018Updated 7 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Key recovery attacks against the CKKS homomorphic approximate encryption scheme☆17Mar 2, 2021Updated 5 years ago
- Pseudonymization with Cryptography☆18Sep 10, 2024Updated last year
- Efficient Anonymous Tokens with Private Metadata Bit☆15Mar 7, 2023Updated 3 years ago
- SIDH C reference implementation☆13Jan 25, 2017Updated 9 years ago
- Numerology: Optimized ECC arithmetic library for secp256k1 in Solidity☆13Nov 2, 2018Updated 7 years ago
- Cingulata (pronounced "tchingulata") is a compiler toolchain and RTE for running C++ programs over encrypted data by means of fully homom…☆407Jun 13, 2025Updated 10 months ago
- ☆15Apr 16, 2022Updated 3 years ago
- Implementation of the Fish and Begol signature schemes☆14Jul 3, 2017Updated 8 years ago
- Implementation of the Groth16 zk-SNARK proving system☆21Jul 6, 2018Updated 7 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Translation from FOL to LTL+Past and LTL, via separation of LTL+Past☆10May 22, 2024Updated last year
- Implementation of Valiant's universal circuit construction optimized for private function evaluation☆44Jan 7, 2021Updated 5 years ago
- Repository and website for the Estimate all the {LWE, NTRU} schemes! code and paper.☆25Aug 29, 2018Updated 7 years ago
- Pure C++ Ver. of TFHE.☆105Apr 1, 2026Updated 2 weeks ago
- An example of dynamically loading a Haskell source module☆18May 9, 2018Updated 7 years ago
- CDLS: Proving Knowledge of Committed Discrete Logarithms with Soundness☆11Nov 2, 2024Updated last year
- Bring fusion to everyone☆14Feb 6, 2020Updated 6 years ago
- High Speed elliptic curve signature system using a 260-bit Granger Moss Prime.☆14Jun 3, 2021Updated 4 years ago
- APRICOT: Advanced Protocols for Real-world Implementation of Computational Oblivious Transfers☆16Nov 17, 2016Updated 9 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- A nullary type class for partial functions☆15Nov 28, 2017Updated 8 years ago
- Solution to harden TLS security by storing private keys and delegating operations to the Trused Execution Environment☆13Oct 10, 2022Updated 3 years ago
- I-D that describes the algorithm identifiers for NIST's PQC ML-DSA for use in the Internet X.509 Public Key Infrastructure☆14Oct 30, 2025Updated 5 months ago
- Intel Homomorphic Encryption Acceleration Library accelerates modular arithmetic operations used in homomorphic encryption by leveraging …☆257Jul 17, 2025Updated 8 months ago
- TFHE: Fast Fully Homomorphic Encryption Library over the Torus☆1,318Sep 17, 2025Updated 6 months ago
- "Programs that explain their effects" talk material☆17Jun 22, 2018Updated 7 years ago
- being the introduction to co-de-Bruijn metasyntax☆23Apr 29, 2022Updated 3 years ago