☆34Jul 9, 2020Updated 5 years ago
Alternatives and similar repositories for prochlo
Users that are interested in prochlo are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆13Oct 6, 2020Updated 5 years ago
- ☆11Apr 19, 2016Updated 9 years ago
- Implementation of calibration bounds for differential privacy in the shuffle model☆21Nov 10, 2020Updated 5 years ago
- ☆32Jul 12, 2023Updated 2 years ago
- Fast interface for SGX secure enclaves. Based on ISCA 2017 HotCalls paper☆24Apr 16, 2021Updated 4 years ago
- ☆10Mar 16, 2026Updated last week
- LLVM with SGX support☆13Feb 5, 2018Updated 8 years ago
- [RFC9380] Hash to curves - Rust reference implementation☆27Mar 10, 2024Updated 2 years ago
- ExitLess services for SGX enclaves☆34Sep 10, 2019Updated 6 years ago
- BinDex: A Two-Layered Index for Fast and Robust Scans (SIGMOD2020)☆10Jun 5, 2020Updated 5 years ago
- Commodity Obfuscation Engine for Intel SGX☆20Jul 21, 2019Updated 6 years ago
- Implementation of cryptographic primitives in Go☆13Mar 13, 2023Updated 3 years ago
- Models for authenticated key exchange in Tamarin☆12Oct 9, 2019Updated 6 years ago
- ☆15Jan 16, 2024Updated 2 years ago
- Materials accompanying "Implementing an Elliptic Curve in Go"☆13Jul 29, 2017Updated 8 years ago
- Docker image: DNS over HTTPS proxy☆11Jun 26, 2020Updated 5 years ago
- Parses https://eprint.iacr.org/eprint-bin/search.pl?last=365&title=1 and sends you an email with the latest papers☆15Nov 11, 2020Updated 5 years ago
- Fast Cardinality Estimation of Multi-Join Queries Using Sketches☆16Feb 29, 2024Updated 2 years ago
- Research and experimental code related to Opacus, an open-source library for training PyTorch models with Differential Privacy☆18Oct 9, 2024Updated last year
- ☆12May 7, 2021Updated 4 years ago
- (Oblivious) DoH Server☆26Feb 21, 2022Updated 4 years ago
- [work in progress] Python framework for supporting cryptographic game-hopping proofs☆13Oct 19, 2022Updated 3 years ago
- ☆55Mar 16, 2021Updated 5 years ago
- A Zig implementation of EdDSA signatures with blind keys.☆17Jul 15, 2023Updated 2 years ago
- Deterministic/nonce-reuse resistant authenticated encryption scheme using XChaCha20, implemented on libsodium.☆31Aug 5, 2024Updated last year
- ☆14Apr 14, 2025Updated 11 months ago
- Efficient TLS termination inside Intel SGX enclaves for existing applications☆110Jan 25, 2022Updated 4 years ago
- ☆26Feb 20, 2025Updated last year
- ☆12Dec 18, 2018Updated 7 years ago
- The anonymous credentials zoo☆16Mar 17, 2021Updated 5 years ago
- ABE GPSW scheme using BLS pairing implemented in Rust.☆16May 23, 2023Updated 2 years ago
- An RFC5297-compliant C implementation of AES-SIV☆20Oct 15, 2020Updated 5 years ago
- Efficient Anonymous Tokens with Private Metadata Bit☆15Mar 7, 2023Updated 3 years ago
- Experimental implementation of the Distributed Aggregation Protocol (DAP) specification.☆65Updated this week
- Paseos is a web app for creating and sharing web journeys.☆15Sep 9, 2024Updated last year
- ☆34Oct 12, 2022Updated 3 years ago
- [RFC9380] Hash to curves - Go reference implementation☆21Nov 20, 2025Updated 4 months ago
- dnscrypt - authenticated and encrypted dns client for nodejs☆14Sep 26, 2020Updated 5 years ago
- Source code for the VLDB 2021 paper.☆11May 19, 2021Updated 4 years ago