PoC of Identity-Based Matchmaking Encryption (CRYPTO 2019)
☆16Jun 1, 2019Updated 6 years ago
Alternatives and similar repositories for matchmaking-encryption
Users that are interested in matchmaking-encryption are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- nircd is new ircd intended to decentralize IRC more☆11Dec 5, 2023Updated 2 years ago
- Fully decentralized p2p IRC for your terminal☆15Jun 2, 2022Updated 3 years ago
- Very simple prototype of identity model☆15Oct 31, 2015Updated 10 years ago
- ☆10Mar 4, 2024Updated 2 years ago
- The combined Python code for the post "Elliptic Curves over Finite Fields"☆17Jun 9, 2020Updated 5 years ago
- A C++ implementation of the DUPLO cryptographic protocol☆22Jun 5, 2017Updated 8 years ago
- ☆14Nov 16, 2022Updated 3 years ago
- ABE GPSW scheme using BLS pairing implemented in Rust.☆16May 23, 2023Updated 2 years ago
- Implements Coron's simplification of Coppersmith's algorithm☆10May 28, 2017Updated 8 years ago
- Acquisition is a mechanism that allows objects to obtain attributes from the containment hierarchy they're in.☆12Nov 29, 2025Updated 3 months ago
- Implementation of "Reading in the Dark: Classifying Encrypted Digits with Functional Encryption"☆22Jul 6, 2023Updated 2 years ago
- This is NotaMUD, which might be a MUD one day, but currently is not. And it may never be. But it thinks it might be. It runs in Node and…☆11Apr 18, 2023Updated 2 years ago
- Automatically exported from code.google.com/p/des-linear-and-differential-cryptoanalysis☆10Nov 15, 2015Updated 10 years ago
- Fluorite: Apache Calcite trace analyzer☆12Apr 15, 2019Updated 6 years ago
- A simple room-based chat application in Nim. Uses Jester and HTMX☆28Nov 23, 2021Updated 4 years ago
- ☆14Nov 29, 2011Updated 14 years ago
- ☆26Jun 18, 2019Updated 6 years ago
- Linear-complexity Private Function Evaluation (PFE) based on homomorphic encryption (as presented at ESORICS'20).☆10Sep 14, 2020Updated 5 years ago
- ☆12Mar 10, 2020Updated 6 years ago
- Asyncio Bittorrent DHT server☆28Nov 1, 2023Updated 2 years ago
- Blog related files.☆14Jan 8, 2026Updated 2 months ago
- Pure Python Obelisk + Bitcoin client side library☆12Apr 6, 2016Updated 9 years ago
- Implementation of Distributed hash table - Chord Protocol☆16Apr 23, 2020Updated 5 years ago
- Implemention of Hierarchical Identity-Based Encryption☆24Dec 16, 2021Updated 4 years ago
- Flink China 社区介绍、参与指南☆10Dec 26, 2018Updated 7 years ago
- QQ一笔画红包解法☆10Apr 19, 2023Updated 2 years ago
- Lattice-Based Zero-Knowledge Proofs and Applications: Shorter, Simpler, and More General☆16Jan 13, 2023Updated 3 years ago
- Git mirror of Victor Shoup's NTL library☆14Mar 8, 2016Updated 10 years ago
- CTF challs and writeups from CNSS.☆18Feb 15, 2020Updated 6 years ago
- A python module to support the use of the IBE, ABE, and PBE family of asymmetric encryption schemes.☆21Oct 24, 2016Updated 9 years ago
- Homomorphic matrix computation☆43Aug 7, 2019Updated 6 years ago
- Ruby implementation of Boldyreva's order-preserving encryption scheme☆13May 13, 2025Updated 10 months ago
- Berlekamp-Massey algorithm☆12Jul 11, 2012Updated 13 years ago
- Privacy layer for blockchain and decentralized applications based on proxy re-encryption☆67Sep 7, 2021Updated 4 years ago
- Comparison of batch and real time OLAP databases☆20Aug 30, 2024Updated last year
- Cryptography Solution is a solution for both backend and frontend which includes ECDH and AES☆10Jul 5, 2018Updated 7 years ago
- Caddy module to throttle incoming connection bandwidth☆15Oct 14, 2025Updated 5 months ago
- An HTML template engine using C++ code generation☆39Feb 15, 2025Updated last year
- toy implementation of bfv in rust☆27Apr 21, 2022Updated 3 years ago