czielinski / secmultipartycomp
Introduction to Secure Multi-Party Computations
☆16Updated 6 years ago
Alternatives and similar repositories for secmultipartycomp
Users that are interested in secmultipartycomp are comparing it to the libraries listed below
Sorting:
- Auditing Applied Cryptography☆10Updated 5 years ago
- ☆9Updated 2 years ago
- High Speed elliptic curve signature system using a 260-bit Granger Moss Prime.☆14Updated 3 years ago
- Malicious Two Party Computation Based on Garbled Circuits.☆12Updated 4 years ago
- A privacy-preserving digital version of punch cards used in store loyalty programs☆10Updated 4 years ago
- APRICOT: Advanced Protocols for Real-world Implementation of Computational Oblivious Transfers☆16Updated 8 years ago
- A decentralized privacy-preserving data sharing tool☆31Updated 3 years ago
- Supporting materials for our EuroS&P paper: Automated Verification for Secure Messaging Protocols and their Implementations: A Symbolic a…☆36Updated 2 years ago
- Distinguisher of Standard & Simulated Elliptic Curves via Traits.☆18Updated 10 months ago
- Signature scheme submitted to NIST's Post-Quantum Cryptography Project☆28Updated 7 years ago
- Slides from talks and other materials related to post-quantum crypto☆12Updated 4 years ago
- Optimizations for Pairing-Based Cryptography☆16Updated 3 years ago
- Pixel: Forward secure multi-signatures and threshold signatures☆17Updated 3 years ago
- Reference implementation of the BLZZRD variant of the BLISS Ring-LWE Signature Scheme☆16Updated 8 years ago
- Embedded curve over the Ristretto255 scalar field, for use in Bulletproofs☆17Updated 5 years ago
- Tools for power measurements of post-quantum cryptographic algorithms☆27Updated 5 years ago
- Public working documents (e.g., Internet drafts)☆23Updated 6 years ago
- Lattice Sieve Algorithm using ListDecoding-based Locality Sensitive Filters☆7Updated 9 years ago
- An implementation of Publicly Verifiably Secret Sharing (PVSS) in Swift.☆12Updated 7 years ago
- Reference implementations of post-quantum cryptographic primitives☆29Updated last year
- Provisions: Privacy-preserving proofs of solvency for Bitcoin☆14Updated 9 years ago
- High Assurance Cryptographic Software☆10Updated 5 months ago
- Faster Montgomery and Joye ladder formulas for short Weierstrass elliptic curves☆20Updated 4 years ago
- A Python tool to manage and tag your bibliography (.bib and .pdf) files on Dropbox☆13Updated 2 years ago
- HILA5 KEM/DEM. Reference and Optimized Implementations + NIST PQC Submission Documents☆16Updated 7 years ago
- This software library is a C-language + optimized assembly code that supports an instance of the Super-Singular Isogeny Diffie-Hellman (S…☆9Updated 6 years ago
- Signature schemes from the paper "Signature Schemes and Anonymous Credentials from Bilinear Maps" by Jan Camenisch and Anna Lysyanskaya☆12Updated 3 years ago
- Optimized Circuit Generation for Secure Multiparty Computation☆12Updated 5 years ago
- ☆21Updated 4 years ago
- Software for "Quantum-Resistant Cryptosystems from Supersingular Elliptic Curve Isogenies"☆90Updated 5 years ago