cvrac / graph-shortest-paths
Efficient shortest path queries over large static/dynamic graphs
☆9Updated 5 years ago
Alternatives and similar repositories for graph-shortest-paths:
Users that are interested in graph-shortest-paths are comparing it to the libraries listed below
- Data-oblivious benchmarks.☆11Updated 5 years ago
- Master Thesis text, University of Athens☆9Updated 5 years ago
- HELM: Navigating Homomorphic Encryption through Gates and Lookup Tables☆10Updated 4 months ago
- Diavgeia Redefined: Redefined functionality of Diavgeia using RDF and Blockchain (GSOC 2017 GFOSS Project).☆13Updated 6 years ago
- A Datalog compiler and library☆19Updated 3 years ago
- Repository of GSOC 2017 GFOSS Project for improving Zeus.☆8Updated 7 years ago
- CryptOpt: Verified Compilation with Randomized Program Search for Cryptographic Primitives☆58Updated 6 months ago
- ☆10Updated 4 years ago
- A programming language to write bitsliced ciphers☆56Updated 4 months ago
- Circuits for functions of interest to cryptography☆27Updated 11 months ago
- Μεμονωμένα Περιστατικά αστυνομικής βίας☆79Updated 3 years ago
- A Tool for the Static Analysis of Cache Side Channels☆39Updated 7 years ago
- A Language and Compiler for Homomorphic Encryption Made easY☆66Updated 4 years ago
- Crypto library☆55Updated 3 months ago
- ☆31Updated 2 years ago
- Mastic: Private Weighted Heavy-Hitters and Attribute-Based Metrics☆11Updated last month
- Spring 2018-2019☆10Updated 5 years ago
- Computer Security Class - Department of Informatics and Telecommunications, University of Athens☆12Updated 7 years ago
- ☆13Updated 3 years ago
- Reference implementations of post-quantum cryptographic primitives☆29Updated last year
- Path Oblivious Heap C++ Reference Implementation☆22Updated 5 years ago
- Tamarin prover manual: source files☆24Updated last month
- Curl: Private LLMs through Wavelet-Encoded Look-Up Tables☆12Updated 5 months ago
- CSAW 2017 Embedded Security Challenge☆12Updated 6 years ago
- RLIBM-ALL: A correctly rounded math library and a polynomial generator that produces correct results for multiple floating point represen…☆14Updated last year
- DEciding Equivalence Properties in SECurity protocols☆17Updated last year
- Implementation of cryptographic primitives in Go☆12Updated last year
- program synthesis is possible☆41Updated 5 years ago
- An extensible compiler for cryptography.☆20Updated last week
- JHU Advanced Topics in Applied Cryptography (601.745)☆52Updated 6 years ago