A cryptography library from NICS Lab
☆20Jan 22, 2013Updated 13 years ago
Alternatives and similar repositories for nics-crypto
Users that are interested in nics-crypto are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Prototype implementation of NTRUReEncrypt in Java☆12Apr 4, 2016Updated 9 years ago
- AFGH Proxy Re-Encryption with RELIC (C library)☆12Mar 5, 2020Updated 6 years ago
- Nearest Neighbor Search in High Dimensional Spaces☆13Nov 18, 2015Updated 10 years ago
- ☆13Oct 26, 2021Updated 4 years ago
- abstract base class for crypto-streams☆22Sep 25, 2025Updated 6 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Umbral implementation in Golang☆43Sep 13, 2018Updated 7 years ago
- Count Min Sketch implementation for Rust☆14Feb 9, 2026Updated last month
- (Keep It) Simple Stupid Database☆10Jul 16, 2017Updated 8 years ago
- Shows how to encrypt data held in public space☆11Aug 11, 2017Updated 8 years ago
- Benchmark and comparison of secure Deep Learning platforms: TF Privacy, PySyft and TF-Encrypted☆10Mar 31, 2021Updated 4 years ago
- A tool to investigate Dependency Confusion in Artifactory☆24May 15, 2025Updated 10 months ago
- Display your process vitals metrics☆10Sep 2, 2025Updated 6 months ago
- Fork of Python's pickle module to work with ZODB☆18Mar 17, 2026Updated last week
- 这是一个通俗易懂的使用Mock的小demo 加入和新特性 hook☆10May 16, 2019Updated 6 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ZODB Client-Server framework☆45Jan 28, 2026Updated last month
- ☆14Nov 16, 2022Updated 3 years ago
- Library implementing the Fan-Vercauteren homomorphic encryption scheme☆62Jul 26, 2016Updated 9 years ago
- Arbitrary precision integers in TensorFlow☆11Dec 27, 2022Updated 3 years ago
- Acquisition is a mechanism that allows objects to obtain attributes from the containment hierarchy they're in.☆12Nov 29, 2025Updated 3 months ago
- OG2 Launch code☆18Oct 17, 2014Updated 11 years ago
- Unmaintained CFD models for Firedrake☆12Nov 8, 2015Updated 10 years ago
- An implementation of ZKBoo☆33May 10, 2022Updated 3 years ago
- This repository contains prototype software implementation of Threshold FHE, i.e., Fully Homomorphic Encryption with threshold decryption…☆10Dec 1, 2022Updated 3 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- ☆20Dec 4, 2025Updated 3 months ago
- Implementation of the DGHV fully homomorphic encryption scheme☆131Mar 25, 2016Updated 10 years ago
- A searchable encryption library from the Encrypted Systems Lab @ Brown University.☆208Jun 29, 2022Updated 3 years ago
- Fluorite: Apache Calcite trace analyzer☆12Apr 15, 2019Updated 6 years ago
- ☆14Nov 29, 2011Updated 14 years ago
- A simplistic but fast Web Content Scanner written in nodejs.☆11Jun 5, 2025Updated 9 months ago
- Implementing use-based privacy for ubiquitous computing.☆18Jun 26, 2025Updated 9 months ago
- A unikernel builder based on MUSL + LKL, designed to run any vanilla application inside an SGX enclave☆10Sep 13, 2016Updated 9 years ago
- Test case minimizer for afl-fuzz☆28Jul 19, 2017Updated 8 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- The SEAL-CPU backend is a Reference backend engine for HEBench which is a shared library that implements the required functions specified…☆11Mar 3, 2023Updated 3 years ago
- watching 4 whole days of live stream, some memorable talks: notes & youtube positions☆12Nov 19, 2017Updated 8 years ago
- Flink China 社区介绍、参与指南☆10Dec 26, 2018Updated 7 years ago
- A system for verifying outsourced computations, and applying SNARKs. Simplified release of the main Pepper codebase.☆128Apr 5, 2022Updated 3 years ago
- Ruby implementation of Boldyreva's order-preserving encryption scheme☆13May 13, 2025Updated 10 months ago
- A iHub Summer 2015 project☆10Sep 7, 2015Updated 10 years ago
- Rust wrapper for Obliv-C☆11Feb 14, 2019Updated 7 years ago