hcrypt-project / oblivious
Oblivious Memory Access under Fully Homomorphic Encryption
☆13Updated 9 years ago
Related projects: ⓘ
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆27Updated 6 years ago
- ☆20Updated this week
- Multiplication using AVX512 and AVX512IFMA instructions☆23Updated 8 years ago
- A VHDL implementation of SipHash☆13Updated 9 years ago
- Implements an encryptable machine (shapeCPU Java)☆11Updated 9 years ago
- Experimental High Assurance Cryptographic Library☆20Updated 8 years ago
- Security monitor for Keystone Enclave (mirror of riscv-pk). Will be deprecated when openSBI port is ready☆36Updated 3 years ago
- Library of crypto primitives for embedded systems☆23Updated 10 years ago
- FLECC_IN_C is a FLexible Elliptic Curve Cryptography library written IN C☆17Updated 6 years ago
- ☆22Updated this week
- like ChaCha, but 64-bit instead of 32-bit thanks to BLAKE2b's permutation☆15Updated 7 years ago
- Snowshoe - Portable, Secure, Fast Elliptic Curve Math Library in C☆62Updated 6 years ago
- Password hashing scheme Argon☆17Updated 9 years ago
- ☆19Updated last year
- Control and diagnostic applications for rump kernels☆36Updated 7 years ago
- empirical measurement of code constructs that seem like they should have constant execution time regardless of values of inputs☆9Updated 8 years ago
- Mirror of http://sourceforge.net/p/ed448goldilocks/code/ci/master/tree/☆32Updated 9 years ago
- C implementation of the BlaBla20 cipher☆9Updated 3 years ago
- AVX2 Chacha implementation☆16Updated 10 years ago
- Symmetric somewhat homomorphic encryption library based on DGHV☆26Updated 7 years ago
- ☆19Updated this week
- BRUTUS is an alternative, fast testing framework for CAESAR ciphers.☆21Updated 8 years ago
- Generator of "nothing-up-my-sleeve" constants☆23Updated 9 years ago
- Label-based networking daemon☆22Updated 5 years ago
- Haraka is a secure and efficient short-input hash function.☆50Updated 6 years ago
- Reference implementations of the GIMLI permutation☆13Updated 7 years ago
- Grain of Salt equation generator☆16Updated 2 years ago
- A compiler for secure multiparty computation☆49Updated 8 years ago
- BAT KEM/Signature Reference Implementation☆19Updated 2 years ago
- Fully Homomorphic Encryption☆28Updated last year