fascy / Dumbo_NGLinks
☆13Updated 3 years ago
Alternatives and similar repositories for Dumbo_NG
Users that are interested in Dumbo_NG are comparing it to the libraries listed below
Sorting:
- ☆11Updated 3 years ago
- information-theoretic asynchronous BFT☆20Updated last year
- BEAT: Asynchronous BFT Made Practical☆17Updated 5 years ago
- Implementation of two BFT consensus protocols☆18Updated 2 years ago
- Maintain a list of open source libraries of cryptographic excellence☆62Updated last month
- A page containing many useful links.☆26Updated last year
- ☆51Updated 3 years ago
- Implementation of some SSE schemes, including Sophos, Diana and Janus☆100Updated 4 years ago
- LaTeX package for typesetting pseudocode and cryptographic games☆188Updated 2 years ago
- ☆21Updated last year
- A Backward-Secure Searchable Encryption Scheme from Symmetric Puncturable Encryption☆45Updated 7 years ago
- ☆34Updated 6 years ago
- MIRACL Core☆235Updated 3 months ago
- The Pairing-based Crypto library☆260Updated 5 months ago
- The OpenABE library - open source cryptographic library with attribute-based encryption implementations in C/C++☆272Updated 2 years ago
- Homomorphic comparison in leveled homomorphic encryption and its applications☆38Updated 4 years ago
- MIRROR: Discrete Gaussians over the Integers☆20Updated 7 years ago
- SpOT-Light: Lightweight Private Set Intersection from Sparse OT Extension (CRYPTO 2019)☆35Updated 3 years ago
- Functional encryption library in Go☆192Updated 2 years ago
- A C++ library containing both easy-to-use lower level bigint/ecgroup interfaces and high-level cryptographical schemes/protocols.☆81Updated 3 months ago
- Private Set Intersection in the Internet Setting From Lightweight Oblivious PRF☆87Updated 3 years ago
- ☆26Updated 6 years ago
- ☆238Updated last month
- Attribute-based Encryption☆207Updated 5 years ago
- DPF and PIR based on DPF in C++☆20Updated 4 years ago
- Implementations of Private Set Intersection Protocols☆187Updated 6 months ago
- A collection of Bristol format circuit files☆14Updated 3 years ago
- Efficient Private Set Intersection base on VOLE☆135Updated 3 months ago
- This is the implementation of the policy-based chameleon hash function with black-box accountability PCHBA. We use PCHBA to secure blockc…☆36Updated 4 years ago
- Source code for the SIGMOD20 paper "vChain: A Blockchain System Ensuring Query Integrity"☆27Updated 4 years ago