f-prime / arcanevmLinks
A Fully Homomorphic Encryption Brainfuck virtual machine
☆215Updated 5 years ago
Alternatives and similar repositories for arcanevm
Users that are interested in arcanevm are comparing it to the libraries listed below
Sorting:
- Flexible and Constant Time Programming Language☆200Updated 3 years ago
- Constant-Time Toolkit☆296Updated 6 years ago
- Cingulata (pronounced "tchingulata") is a compiler toolchain and RTE for running C++ programs over encrypted data by means of fully homom…☆407Updated last year
- Bulletproofs are short non-interactive zero-knowledge proofs that require no trusted setup☆540Updated 2 years ago
- A light version of Tor portable to the browser☆120Updated 4 years ago
- Using z3's never been easier (maybe)☆102Updated 3 years ago
- A "living" Linux process with no memory☆344Updated 4 years ago
- A Rust library for lattice-based additive homomorphic encryption.☆415Updated last year
- A Rust implementation of the Message Layer Security group messaging protocol☆115Updated last year
- Please see https://github.com/hacspec/hax☆243Updated last year
- ☆214Updated 4 years ago
- DISCoHAsH - Simple, fast, quality hash in 120 lines. 10GB/s serial (depending on hardware). Also in NodeJS☆217Updated last year
- Program a bot using assembly-like code in this competitive game!☆59Updated 4 years ago
- Basic SAT model of x86 instructions using Z3, autogenerated from Intel docs☆318Updated 3 years ago
- problem sets for CS-GY 6903 Applied Cryptography☆41Updated 3 years ago
- An implementation of rule 110 in Scalable Vector Graphics☆147Updated 4 years ago
- Beamsplitter - A new (possibly universal) hash that passes SMHasher. Built mainly with a random 10x64 S-box. Also in NodeJS☆91Updated last month
- Intuitive Advanced Cryptography☆438Updated 2 years ago
- Brzozowski derivative python sketch☆85Updated last month
- Automated generation of provably secure, zero-copy parsers from format specifications☆273Updated this week
- Decentralize your secrets!☆117Updated 5 years ago
- A programming language for the decentralized web☆448Updated 2 years ago
- C Compiler which targets Excel (MS Office)☆287Updated 4 years ago
- Jupyter notebook for explaining elliptic curve encryption☆88Updated 4 years ago
- A distributed hash table with unusually strong security properties☆64Updated 5 years ago
- Verified Assembly Language for Everest☆291Updated last year
- An exploration to host Wikipedia in IPFS☆175Updated 2 years ago
- ☆183Updated 5 years ago
- Authenticated key-value store (i.e. an urkel tree)☆315Updated 2 years ago
- A static analysis file format checker.☆239Updated 4 years ago