gdanezis / petlibLinks
A python library that implements a number of Privacy Enhancing Technolgies
☆133Updated 2 years ago
Alternatives and similar repositories for petlib
Users that are interested in petlib are comparing it to the libraries listed below
Sorting:
- XPIR: Private Information Retrieval for Everyone☆119Updated 3 years ago
- A bilinear pairing library for petlib☆37Updated 2 years ago
- ☆50Updated 2 years ago
- Exercises in Privacy Enhancing Technologies (UCL Information Security MSc; Course COMPGA17)☆38Updated 5 years ago
- JHU Advanced Topics in Applied Cryptography (601.745)☆52Updated 7 years ago
- Implementation of a pairing over a Barreto-Naehrig curve on top of OpenSSL.☆31Updated 9 years ago
- Privacy-preserving Tor statistics aggregation tool that implements the secret-sharing variant of the PrivEx algorithm.☆26Updated 4 years ago
- CryptoBib Main Repository for Developers☆19Updated 9 months ago
- Proof-of-concept implementation of a homomorphic Simon encryption using YASHE and FV leveled homomorphic cryptosystems☆19Updated 9 years ago
- ☆58Updated 8 years ago
- Comprehensive Open Source Library for Secure Multiparty Computation☆186Updated last year
- An Implementation of Order-Revealing Encryption☆94Updated 4 years ago
- Proof-of-concept implementation of a cryptographic multilinear maps on the integers☆12Updated 3 years ago
- (Inactive, see readme) Multiparty computation with SPDZ, MASCOT, and Overdrive offline phases☆222Updated 6 years ago
- An implementation of the LowMC block cipher family.☆27Updated 7 years ago
- Software for "Quantum-Resistant Cryptosystems from Supersingular Elliptic Curve Isogenies"☆88Updated 5 years ago
- A Platform for Robust Threshold Cryptography based on Asynchronous Publicly Verifiable Secret Sharing with Tunable Security☆96Updated 2 years ago
- ☆97Updated 8 years ago
- DEPRECATED – See NOTICE below about migration to new repository – Post-quantum key exchange from the ring learning with errors problem☆59Updated 8 years ago
- Pure Python Paillier Homomorphic Cryptosystem☆134Updated 6 years ago
- Deployments of fancy cryptography☆143Updated last month
- Experimental implementation of KEMTLS in Rustls☆30Updated last year
- HAL: A Library for Homomorphic Authentication☆20Updated 8 years ago
- A C++ implementation of the DUPLO cryptographic protocol☆22Updated 7 years ago
- Implementation of the Fish and Begol signature schemes☆14Updated 7 years ago
- ☆26Updated 6 years ago
- Proof-of-concept implementation of an identity-based encryption scheme over NTRU lattices☆45Updated 8 years ago
- ☆139Updated last month
- Post-quantum key exchange from the learning with errors problem — from the paper "Frodo: Take off the ring! Practical, Quantum-Secure Key…☆46Updated 7 years ago
- Implementation of Brakerski's leveled homomorphic encryption system☆43Updated 8 years ago