Exercises in Privacy Enhancing Technologies (UCL Information Security MSc; Course COMPGA17)
☆40Apr 9, 2020Updated 6 years ago
Alternatives and similar repositories for PET-Exercises
Users that are interested in PET-Exercises are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A python library that implements a number of Privacy Enhancing Technolgies☆135Oct 26, 2022Updated 3 years ago
- A general-purpose privacy-preserving Analytics platform!☆10Mar 27, 2019Updated 7 years ago
- Mirror of freehaven's anonymous research bibliography☆14Feb 10, 2015Updated 11 years ago
- API for academia.srmuniv.ac.in☆11Sep 13, 2018Updated 7 years ago
- ☆10May 8, 2018Updated 7 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- a web page / paper☆18Feb 24, 2017Updated 9 years ago
- A Decentralised microblogging website on ethereum blockchain☆14Jun 11, 2018Updated 7 years ago
- ☆10Jun 29, 2022Updated 3 years ago
- Capability-based secure key management and credential storage☆120Mar 21, 2013Updated 13 years ago
- ☆10Jan 23, 2018Updated 8 years ago
- Deterministic And Verifiable Randomness On Schnorr signatures☆12Nov 18, 2017Updated 8 years ago
- Smart Contract tools to help streamline Ethereum dapp development and deployment☆13Oct 16, 2017Updated 8 years ago
- ☆10Jan 7, 2024Updated 2 years ago
- A package for accurately computing running (online) mean, variance, and standard deviation in golang☆11Oct 16, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Reference implementation of the BLZZRD variant of the BLISS Ring-LWE Signature Scheme☆17Oct 11, 2016Updated 9 years ago
- An O(N\log{N}) time algorithm for computing all N proofs fast in the Pointproofs VC. Also, the O(N\log{N}) time Feist-Khovratovich algori…☆13Dec 3, 2020Updated 5 years ago
- Mix Network Bibliography☆15Feb 6, 2020Updated 6 years ago
- ☆18May 5, 2020Updated 5 years ago
- ☆20May 21, 2014Updated 11 years ago
- Simple implementation of KZG commitments in C☆14Nov 19, 2022Updated 3 years ago
- Implementation of various primitives for bellman using CUDA (WIP)☆28Jul 20, 2019Updated 6 years ago
- Python library for working with JSON HAL☆38Aug 29, 2013Updated 12 years ago
- Puppet DSL 'noop' function. This allows every resource in the containing scope to be set to noop by default.☆18Feb 16, 2024Updated 2 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Working Copy of the NSEC5 Specification☆15Nov 10, 2020Updated 5 years ago
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆28Apr 20, 2018Updated 7 years ago
- A Rust library for the Groth-Sahai non-interactive witness-indistinguishable and zero-knowledge proof system☆14May 1, 2025Updated 11 months ago
- ☆42Oct 19, 2021Updated 4 years ago
- (Deprecated PoC) Innovative censorship evading technology based on p2p distributed caching network☆59Sep 23, 2016Updated 9 years ago
- AWS Lambda powered drop-in replacement for ImageMagick convert command line tool☆11Oct 25, 2025Updated 5 months ago
- ☆10Jul 29, 2019Updated 6 years ago
- Rename Hypothesis tags☆15Mar 2, 2020Updated 6 years ago
- Rust crate for BLS signatures☆32Jul 15, 2024Updated last year
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Efficient multi-asset confidential transactions☆34Apr 4, 2019Updated 7 years ago
- wipppp☆18May 15, 2022Updated 3 years ago
- ☆10Jan 24, 2022Updated 4 years ago
- An implementation of Brakerski et al's "Fully homomorphic encryption without bootstrapping"☆11Apr 29, 2013Updated 12 years ago
- ☆21Jan 8, 2026Updated 3 months ago
- ☆20Dec 24, 2019Updated 6 years ago
- Alternative zk-SNARK proof verifier written in Rust for Zcash Sprout.☆20Aug 12, 2017Updated 8 years ago