Malicious Two Party Computation Based on Garbled Circuits.
☆12Sep 5, 2020Updated 5 years ago
Alternatives and similar repositories for emp-m2pc
Users that are interested in emp-m2pc are comparing it to the libraries listed below
Sorting:
- ☆21Oct 14, 2022Updated 3 years ago
- Semi-honest Two Party Computation Based on Garbled Circuits.☆81Mar 12, 2026Updated last week
- Authenticated Garbling and Efficient Maliciously Secure Two-Party Computation☆33Nov 13, 2025Updated 4 months ago
- ☆241Mar 12, 2026Updated last week
- Oblivious Transfer, Oblivious Transfer Extension and Variations☆183Mar 12, 2026Updated last week
- A generic Secure Computation API for garbled circuits, SPDZ, etc.☆21May 12, 2023Updated 2 years ago
- Sonic implementation in Rust☆17Jun 4, 2019Updated 6 years ago
- MPC in wasm based on emp-toolkit☆11Jun 13, 2025Updated 9 months ago
- FELICS Framework☆11Dec 5, 2019Updated 6 years ago
- MIT 6.875☆14Dec 13, 2025Updated 3 months ago
- A zkSNARK implementation of a merkle tree membership preimage proof.☆22May 6, 2019Updated 6 years ago
- ☆184Jun 21, 2021Updated 4 years ago
- Global-Scale Secure Multiparty Computation☆50Nov 13, 2025Updated 4 months ago
- A privacy-preserving digital version of punch cards used in store loyalty programs☆11Apr 19, 2021Updated 4 years ago
- ☆13Mar 23, 2018Updated 7 years ago
- Rust Implementation of Ethereum Binary Tree EIP-7864☆16Jul 13, 2025Updated 8 months ago
- Solution to harden TLS security by storing private keys and delegating operations to the Trused Execution Environment☆13Oct 10, 2022Updated 3 years ago
- Proof-of-concept implementation of a homomorphic Simon encryption using YASHE and FV leveled homomorphic cryptosystems☆20Aug 8, 2015Updated 10 years ago
- Cerebro: A platform for Secure Coopetitive Learning☆24Sep 9, 2021Updated 4 years ago
- SILVER - Statistical Independence and Leakage Verification☆15Jun 6, 2025Updated 9 months ago
- A collection of SML utility modules that are useful for compiler writing.☆11Dec 17, 2025Updated 3 months ago
- Basic implementation of Borromean ring signatures in Python, for learning☆15Dec 14, 2017Updated 8 years ago
- This work combines differential privacy and multi-party computation protocol to achieve distributed machine learning.☆26Oct 15, 2020Updated 5 years ago
- Secure Interrogation of Genomic Databases (SIG-DB) using Homomorphic Encryption☆10May 16, 2018Updated 7 years ago
- A library for supporting zk-SNARKs to Substrate☆29Jun 23, 2022Updated 3 years ago
- supplement material for BlackHat2020 talk: Multiple Bugs in Multi-Party Computation: Breaking Cryptocurrency's Strongest Wallets☆12Aug 13, 2020Updated 5 years ago
- ☆20Jan 17, 2025Updated last year
- Rust implementation of Zcash multi-signautres☆13Jun 23, 2019Updated 6 years ago
- code for privacy-preserving sat solver☆17Jul 14, 2023Updated 2 years ago
- Confidential Transactions with Reusable Commitments on Ethereum☆17Mar 16, 2020Updated 6 years ago
- Hackathon project for Snarky workshop.☆11Jun 21, 2019Updated 6 years ago
- ☆11May 17, 2021Updated 4 years ago
- Oblivious Pseudorandom Functions (OPRFs) using Prime-Order Groups☆39Sep 10, 2024Updated last year
- Coconut: Threshold Issuance Selective Disclosure Credentials with Applications to Distributed Ledgers☆14Oct 20, 2019Updated 6 years ago
- A C++ implementation of the DUPLO cryptographic protocol☆22Jun 5, 2017Updated 8 years ago
- Oracle feeder service (presently supporting Terra)☆14Jan 23, 2023Updated 3 years ago
- Batch Dual Execution framework for secure multiparty computation☆17Jul 3, 2017Updated 8 years ago
- Traits and utilities for working with finite fields☆18Aug 15, 2024Updated last year
- Distinguisher of Standard & Simulated Elliptic Curves via Traits.☆18Jun 20, 2024Updated last year