cryptoonline / seLinks
☆8Updated 9 years ago
Alternatives and similar repositories for se
Users that are interested in se are comparing it to the libraries listed below
Sorting:
- 6.858 Computer Systems Security: Lecture notes (edited a little and formatted with Markdown)☆46Updated 7 years ago
- LaTeX beamer slides for aggregatable subvector commitments (aSVC) talk☆10Updated 4 years ago
- Path Oblivious Heap C++ Reference Implementation☆22Updated 5 years ago
- Implementation of the Paillier homomorphic cryptosystem using GMP☆29Updated 3 years ago
- ☆36Updated 4 years ago
- A Go library for MerkleSquare: A Low-Latency Transparency Log System☆22Updated 4 years ago
- Python implementation of the HydRand protocol☆18Updated 2 years ago
- Fast 4 way vectorized ladder for the complete set of Montgomery curves☆11Updated 6 years ago
- Solution to harden TLS security by storing private keys and delegating operations to the Trused Execution Environment☆12Updated 2 years ago
- Paxos Made Simple☆19Updated 2 years ago
- distributed RSA modulus generation in Rust☆15Updated 3 years ago
- Implementation of Shamir's secret sharing in C++11☆9Updated 10 years ago
- IPC implementation atop CometBFT☆16Updated last year
- ABE GPSW scheme using BLS pairing implemented in Rust.☆15Updated 2 years ago
- Malicious Two Party Computation Based on Garbled Circuits.☆12Updated 4 years ago
- An O(N\log{N}) time algorithm for computing all N proofs fast in the Pointproofs VC. Also, the O(N\log{N}) time Feist-Khovratovich algori…☆13Updated 4 years ago
- Minimal C++ asynchronous network library for distributed systems.☆36Updated 4 years ago
- Compact Proofs of Retrievability☆14Updated 11 years ago
- EN.601.741: Advanced Topics in Secure and Censorship-Resistant Communications☆15Updated 4 years ago
- An experimental library for PDP and POR☆29Updated 4 years ago
- Provisions: Privacy-preserving proofs of solvency for Bitcoin☆14Updated 9 years ago
- Designing Secure Cryptography☆22Updated 6 years ago
- Multi-Server PIR (CCSW'14)☆11Updated 4 years ago
- ☆28Updated 5 years ago
- Randhound and Randherd implementation for IEEE SnP '17 paper☆16Updated 8 years ago
- Simple Encrypted File System for Occlum☆12Updated 6 months ago
- JHU Advanced Topics in Applied Cryptography (601.745)☆53Updated 7 years ago
- Multi-Authority Policy-based Chameleon Hash☆14Updated 4 years ago
- Efficient Anonymous Tokens with Private Metadata Bit☆15Updated 2 years ago
- ☆14Updated 7 years ago