Malicious Two Party Computation Based on Garbled Circuits.
☆12Sep 5, 2020Updated 5 years ago
Alternatives and similar repositories for emp-m2pc
Users that are interested in emp-m2pc are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Semi-honest Two Party Computation Based on Garbled Circuits.☆81Updated this week
- Authenticated Garbling and Efficient Maliciously Secure Two-Party Computation☆33Nov 13, 2025Updated 6 months ago
- ☆241Updated this week
- Oblivious Transfer, Oblivious Transfer Extension and Variations☆185Updated this week
- A generic Secure Computation API for garbled circuits, SPDZ, etc.☆21May 12, 2023Updated 3 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Sonic implementation in Rust☆17Jun 4, 2019Updated 6 years ago
- MPC in wasm based on emp-toolkit☆11Jun 13, 2025Updated 11 months ago
- MIT 6.875☆14Dec 13, 2025Updated 5 months ago
- A zkSNARK implementation of a merkle tree membership preimage proof.☆22May 6, 2019Updated 7 years ago
- ☆184Jun 21, 2021Updated 4 years ago
- A privacy-preserving digital version of punch cards used in store loyalty programs☆11Apr 19, 2021Updated 5 years ago
- ☆13Mar 23, 2018Updated 8 years ago
- Rust Implementation of Ethereum Binary Tree EIP-7864☆16Jul 13, 2025Updated 10 months ago
- ☆32Dec 6, 2022Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Solution to harden TLS security by storing private keys and delegating operations to the Trused Execution Environment☆13Oct 10, 2022Updated 3 years ago
- A Flexible Efficient Secure Computation Backend☆33May 26, 2018Updated 7 years ago
- Cryptographic protocols for Solidity.☆13Aug 6, 2017Updated 8 years ago
- Proof-of-concept implementation of a homomorphic Simon encryption using YASHE and FV leveled homomorphic cryptosystems☆20Aug 8, 2015Updated 10 years ago
- Cerebro: A platform for Secure Coopetitive Learning☆24Sep 9, 2021Updated 4 years ago
- SILVER - Statistical Independence and Leakage Verification☆16Jun 6, 2025Updated 11 months ago
- Basic implementation of Borromean ring signatures in Python, for learning☆17Dec 14, 2017Updated 8 years ago
- This work combines differential privacy and multi-party computation protocol to achieve distributed machine learning.☆27Oct 15, 2020Updated 5 years ago
- Secure Interrogation of Genomic Databases (SIG-DB) using Homomorphic Encryption☆10May 16, 2018Updated 8 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A library for supporting zk-SNARKs to Substrate☆29Jun 23, 2022Updated 3 years ago
- supplement material for BlackHat2020 talk: Multiple Bugs in Multi-Party Computation: Breaking Cryptocurrency's Strongest Wallets☆12Aug 13, 2020Updated 5 years ago
- ☆20Jan 17, 2025Updated last year
- Rust implementation of Zcash multi-signautres☆13Jun 23, 2019Updated 6 years ago
- code for privacy-preserving sat solver☆17Jul 14, 2023Updated 2 years ago
- Confidential Transactions with Reusable Commitments on Ethereum