A page containing many useful links.
☆26Sep 6, 2024Updated last year
Alternatives and similar repositories for UsefulLink
Users that are interested in UsefulLink are comparing it to the libraries listed below
Sorting:
- NFGen: Automatic Non-Linear Function Evaluation Code Generator for General-purpose MPC Platforms☆20Dec 24, 2025Updated 2 months ago
- SecureML Introduction☆10Aug 12, 2023Updated 2 years ago
- ☆21Oct 14, 2022Updated 3 years ago
- Implementation of cryptographic attacks. Mainly reproduction of recent cryptographic papers.☆15Dec 4, 2024Updated last year
- Function secret sharing (FSS) primitives including distributed point/comparison function (DPF/DCF)☆30Updated this week
- Attribute-based Encryption Schemes☆10Nov 16, 2021Updated 4 years ago
- Code repository for the paper at USENIX Security'24☆37Aug 11, 2024Updated last year
- dblp Knowledge Graph☆15Jan 16, 2025Updated last year
- XDU-计科网安方向大数据安全与隐私实验三阶梯三-数据差分隐私处理☆13Jun 25, 2022Updated 3 years ago
- Maintain a list of open source libraries of cryptographic excellence☆62Nov 21, 2025Updated 4 months ago
- A distributed file system utilizing attribute-based encryption to achieve secure authentication, authorization, storage, and transmission…☆14May 18, 2017Updated 8 years ago
- Secure Aggregation for Federated Learning with Malicious Actors☆28Dec 6, 2022Updated 3 years ago
- Robust Encryption of Quantum Medical Images☆11May 20, 2019Updated 6 years ago
- ☆11Jan 17, 2023Updated 3 years ago
- A fast, portable, and easy to use Oblivious Transfer Library☆488Jan 26, 2026Updated last month
- Repository for collection of research papers on multi-party learning.☆34Aug 9, 2023Updated 2 years ago
- Delta Development Documentation☆24Jun 8, 2023Updated 2 years ago
- ☆11Nov 27, 2024Updated last year
- ☆12Apr 22, 2023Updated 2 years ago
- Proof-of-Concept of the Frontal Attack☆11Jul 6, 2023Updated 2 years ago
- Improved Constructions for Distributed Multi-Point Functions - accepted to IEEE S&P 2025☆17Sep 24, 2025Updated 5 months ago
- This repository is some implementation of ABE (attribute-base encryption) scheme☆20Nov 2, 2020Updated 5 years ago
- Noir support for Zed☆11May 3, 2024Updated last year
- ☆11Sep 10, 2024Updated last year
- Function Secret Sharing for Secure Thresholded Distance Metric Evaluation. The code accompanying the paper.☆13Dec 12, 2024Updated last year
- Private Set Union☆15Oct 24, 2022Updated 3 years ago
- python黑帽子编程☆11Jun 10, 2021Updated 4 years ago
- 戴爷爷的量子力学☆11Apr 10, 2021Updated 4 years ago
- The implementation of FedBCD algorithm published in the paper "FedBCD: A Communication-Efficient Collaborative Learning Framework for Dis…☆15Jul 2, 2024Updated last year
- Function-Dependent Preprocessing in MOTION☆14Nov 27, 2023Updated 2 years ago
- Privacy -preserving Neural Networks☆79Dec 21, 2018Updated 7 years ago
- ZK Theorem Proving☆10Aug 11, 2024Updated last year
- Implementation of Distributed function secret sharing and applications☆15May 10, 2025Updated 10 months ago
- rkm0959 implements stuff☆45Sep 21, 2022Updated 3 years ago
- Solutions for all programming assignments from Stanford's University Online Cryptography Course (C#)☆11Apr 12, 2015Updated 10 years ago
- 《自己动手设计数据库》摘录☆10Oct 28, 2016Updated 9 years ago
- ☆43May 13, 2024Updated last year
- DPF and PIR based on DPF in C++☆21Mar 4, 2021Updated 5 years ago
- Mac 开源工具汇总☆13Jan 22, 2021Updated 5 years ago