☆11May 24, 2017Updated 8 years ago
Alternatives and similar repositories for CODA
Users that are interested in CODA are comparing it to the libraries listed below
Sorting:
- Saratov State University, CSIT. Discipline "cryptographic methods of information security" (криптографические методы защиты информации, r…☆15Jun 28, 2018Updated 7 years ago
- A simulation of disease spread in livestock populations. Includes detection and containment simulation.☆10Jan 4, 2024Updated 2 years ago
- API of homomorphic binary operations such as binary comparisons or binary divisions using the library HElib☆29Dec 14, 2021Updated 4 years ago
- This repository contains prototype software implementation of Threshold FHE, i.e., Fully Homomorphic Encryption with threshold decryption…☆10Dec 1, 2022Updated 3 years ago
- 整理有关密码学相关的代码及知识点,主要用 Python 编写☆27May 27, 2017Updated 8 years ago
- The SEAL-CPU backend is a Reference backend engine for HEBench which is a shared library that implements the required functions specified…☆11Mar 3, 2023Updated 3 years ago
- ☆15Nov 16, 2015Updated 10 years ago
- 这是一个通俗易懂的使用Mock的小demo 加入和新特性 hook☆10May 16, 2019Updated 6 years ago
- This project is used to develop a React Native based Android SDK☆12Oct 6, 2018Updated 7 years ago
- The matlab code of Sparse Contextual Activation (SCA) published in TIP 2016☆10Mar 18, 2018Updated 7 years ago
- AutoRNP -- Automated Repair of High Floating-Point Errors in Numerical Libraries☆12Dec 28, 2018Updated 7 years ago
- Manage multiple email addresses per user (or other model/doc) with this mongoose schema plugin.☆13Jan 21, 2017Updated 9 years ago
- Fluorite: Apache Calcite trace analyzer☆12Apr 15, 2019Updated 6 years ago
- GPU implementation of Winograd convolution☆10Oct 23, 2017Updated 8 years ago
- Linear-complexity Private Function Evaluation (PFE) based on homomorphic encryption (as presented at ESORICS'20).☆10Sep 14, 2020Updated 5 years ago
- Privacy-Preserving Multiple Tensor Factorization for Synthesizing Large-Scale Location Traces☆14Sep 14, 2021Updated 4 years ago
- Shows how to encrypt data held in public space☆11Aug 11, 2017Updated 8 years ago
- ☆15Feb 6, 2026Updated 3 weeks ago
- Matlab implementation of the CS video reconstruction method RRS☆11May 21, 2018Updated 7 years ago
- ☆14Nov 16, 2022Updated 3 years ago
- Homomorphic matrix computation☆43Aug 7, 2019Updated 6 years ago
- semantic segmentation using pytorch☆11Dec 1, 2017Updated 8 years ago
- Acquisition is a mechanism that allows objects to obtain attributes from the containment hierarchy they're in.☆12Nov 29, 2025Updated 3 months ago
- JNI调用C++自定义类,详细参考一下博文《Android:JNI调用C++自定义类的详细方法》:☆10May 17, 2018Updated 7 years ago
- ☆10Sep 3, 2016Updated 9 years ago
- The backend algorithms and framework associated with DREAM3DNX, a data analysis program for materials science data analytics☆13Updated this week
- ☆12Mar 31, 2017Updated 8 years ago
- ☆14Nov 29, 2011Updated 14 years ago
- C++ coroutine protocol library.☆12Sep 2, 2025Updated 6 months ago
- 基于HElib库的云计算平台设计与实现☆12Apr 18, 2016Updated 9 years ago
- Solr on YARN prototype☆18Nov 14, 2014Updated 11 years ago
- ☆13Jun 14, 2017Updated 8 years ago
- ☆12Aug 21, 2018Updated 7 years ago
- ☆12Feb 28, 2017Updated 9 years ago
- Accelerating CNN's convolution operation on GPUs by using memory-efficient data access patterns.☆14Dec 8, 2017Updated 8 years ago
- JOCLBlast - Java bindings for CLBlast☆15Mar 14, 2021Updated 4 years ago
- ☆16Feb 13, 2026Updated 2 weeks ago
- Cryptography Solution is a solution for both backend and frontend which includes ECDH and AES☆10Jul 5, 2018Updated 7 years ago
- Website for DGL project☆13Feb 13, 2025Updated last year