gdanezis / PET-ExercisesLinks
Exercises in Privacy Enhancing Technologies (UCL Information Security MSc; Course COMPGA17)
☆39Updated 5 years ago
Alternatives and similar repositories for PET-Exercises
Users that are interested in PET-Exercises are comparing it to the libraries listed below
Sorting:
- A python library that implements a number of Privacy Enhancing Technolgies☆135Updated 2 years ago
- CryptoBib Main Repository for Developers☆19Updated last year
- ☆58Updated 8 years ago
- An Implementation of the Fully Homomorphic Smart-Vercauteren Cryptosystem☆44Updated 10 years ago
- Links to stuff arising from or related to the HACS workshop.☆34Updated 7 years ago
- Symmetric somewhat homomorphic encryption library based on DGHV☆27Updated 8 years ago
- DEPRECATED – See NOTICE below about migration to new repository – Post-quantum key exchange from the ring learning with errors problem☆59Updated 8 years ago
- Privacy-preserving Tor statistics aggregation tool that implements the secret-sharing variant of the PrivEx algorithm.☆26Updated 4 years ago
- Software for "Quantum-Resistant Cryptosystems from Supersingular Elliptic Curve Isogenies"☆89Updated 6 years ago
- ☆99Updated 9 years ago
- Proof-of-concept implementation of a cryptographic multilinear maps on the integers☆12Updated 3 years ago
- A bilinear pairing library for petlib☆38Updated 2 years ago
- Implementation of a pairing over a Barreto-Naehrig curve on top of OpenSSL.☆31Updated 9 years ago
- ☆33Updated 4 years ago
- privacy-preserving attribute-based credentials engine☆80Updated 9 years ago
- js-ctypes wrapper for libotr☆29Updated 7 years ago
- Self-contained educational implementation of the BLISS-B Bimodal Lattice Signature Scheme☆15Updated 9 years ago
- axolotl based on libsodium☆22Updated 9 years ago
- Reference implementation of the BLZZRD variant of the BLISS Ring-LWE Signature Scheme☆16Updated 8 years ago
- A CONIKS implementation in Java☆61Updated 6 years ago
- ZKPDL & cashlib: A language-based system for zero-knowledge proofs and electronic cash (e-cash).☆54Updated 9 years ago
- SIDH C reference implementation☆13Updated 8 years ago
- A user-first approach to threat modeling.☆17Updated 4 months ago
- The secure messaging summit information☆20Updated 4 years ago
- Secure multiparty messaging (kindof)☆21Updated 9 years ago
- Repo for the implementation of the isogeny based signature scheme CSI-FiSh☆24Updated 2 years ago
- JHU Advanced Topics in Applied Cryptography (601.745)☆53Updated 7 years ago
- ☆143Updated 4 months ago
- a Private Publish Subscribe System☆51Updated last year
- CoSi command line interface☆21Updated 8 years ago