hackerfactor / SEALLinks
Secure Evidence Attribution Label (SEAL)
☆28Updated 3 weeks ago
Alternatives and similar repositories for SEAL
Users that are interested in SEAL are comparing it to the libraries listed below
Sorting:
- Secure distributed dataflow framework for encrypted machine learning and data processing☆66Updated last year
- Rust source code for the FrodoPIR Private Information Retrieval scheme.☆67Updated last year
- SDK for private data access, built on homomorphic encryption.☆345Updated last year
- ☆26Updated 2 weeks ago
- Implementation of a drand client in Rust☆26Updated last year
- ☆21Updated 4 years ago
- Tool kit for building secure, scalable, and networked services on top of AWS Nitro Enclaves.☆43Updated last week
- The reference implementation of Tiptoe, accompanying the paper "Private web search with Tiptoe" (SOSP 2023).☆48Updated last year
- Passive-Swoosh: Practical Lattice-Based Non-Interactive Key Exchange☆27Updated last year
- A CLI tool to for crypto functions☆11Updated 5 months ago
- A map of relationships among cryptographic primitives☆12Updated 6 years ago
- Implementation of Prio in Rust.☆110Updated this week
- Example of using WONNX on the web☆24Updated 2 years ago
- ☆14Updated last year
- Pure Rust implementation of FIPS 204 Module-Lattice-Based Digital Signature Standard for server, desktop, browser and embedded applicatio…☆22Updated 3 weeks ago
- Is SIKE broken yet?☆19Updated 2 years ago
- Rust encryption library for practical time-lock encryption.☆30Updated 11 months ago
- Zero Knowledge Virtual Machine from scratch implementing Pinocchio☆39Updated last year
- Production build of Gauss Labs' MP-PSI API using 2PC and FHE☆17Updated last year
- Oblivious Pseudorandom Functions (OPRFs) using Prime-Order Groups☆38Updated 9 months ago
- ☆11Updated 2 months ago
- Command line tool for displaying and adding C2PA manifests☆121Updated 6 months ago
- Piano: Extremely Simple, Single-server Private Information Retrieval with Sublinear Server Computation☆34Updated 9 months ago
- A scheme that produces a zero-knowledge proof of correctness for an MPC computation. The scheme allows anyone, particularly someone exter…☆26Updated last year
- [FAccT 2022] Source code for our paper "Learning to Break Deep Perceptual Hashing: The Use Case NeuralHash".☆28Updated 11 months ago
- ☆14Updated last year
- Supply chain security for ML☆170Updated this week
- ☆136Updated last month
- ☆23Updated 11 months ago
- Making transparency normal!☆24Updated last year