gdanezis / PET-Exercises
Exercises in Privacy Enhancing Technologies (UCL Information Security MSc; Course COMPGA17)
☆38Updated 4 years ago
Alternatives and similar repositories for PET-Exercises:
Users that are interested in PET-Exercises are comparing it to the libraries listed below
- A python library that implements a number of Privacy Enhancing Technolgies☆132Updated 2 years ago
- CryptoBib Main Repository for Developers☆19Updated 6 months ago
- Secure multiparty messaging (kindof)☆21Updated 8 years ago
- An Implementation of the Fully Homomorphic Smart-Vercauteren Cryptosystem☆44Updated 9 years ago
- A general-purpose privacy-preserving Analytics platform!☆11Updated 5 years ago
- Privacy-preserving Tor statistics aggregation tool that implements the secret-sharing variant of the PrivEx algorithm.☆26Updated 4 years ago
- specification and design documents☆54Updated 2 years ago
- repository for tracking open tasks☆18Updated 7 years ago
- ☆57Updated 7 years ago
- A core and experimental implementation of ClaimChain☆34Updated 6 years ago
- Symmetric somewhat homomorphic encryption library based on DGHV☆27Updated 7 years ago
- Links to stuff arising from or related to the HACS workshop.☆35Updated 7 years ago
- Proof-of-concept implementation of a cryptographic multilinear maps on the integers☆12Updated 3 years ago
- The public repository of the Loopix mix system☆68Updated 7 years ago
- A bilinear pairing library for petlib☆35Updated 2 years ago
- a Private Publish Subscribe System☆49Updated 9 months ago
- A CONIKS implementation in Java☆60Updated 6 years ago
- library for implementing the server side of the mix network: mixes and providers☆26Updated 2 years ago
- The secure messaging summit information☆20Updated 4 years ago
- Implementation of a pairing over a Barreto-Naehrig curve on top of OpenSSL.☆31Updated 9 years ago
- GnuPG based Pseudonym Server☆14Updated 7 years ago
- ☆49Updated last year
- JHU Advanced Topics in Applied Cryptography (601.745)☆52Updated 6 years ago
- An hash-chain with efficient O(1) append and O(logN) proof.☆14Updated 6 years ago
- ♥ ♥ ♥ Trevor's & Moxie's Axolotl Ratchet + AGL's xmpp-client ♥ ♥ ♥☆12Updated 10 years ago
- Implementation of the Fish and Begol signature schemes☆13Updated 7 years ago
- Proof-of-concept implementation of a homomorphic Simon encryption using YASHE and FV leveled homomorphic cryptosystems☆19Updated 9 years ago
- Public working documents (e.g., Internet drafts)☆22Updated 6 years ago
- Software for "Quantum-Resistant Cryptosystems from Supersingular Elliptic Curve Isogenies"☆90Updated 5 years ago
- Freely available cryptographic iconography☆66Updated 8 years ago