hcrypt-project / obliviousJLinks
Implements an encryptable machine (shapeCPU Java)
☆11Updated 10 years ago
Alternatives and similar repositories for obliviousJ
Users that are interested in obliviousJ are comparing it to the libraries listed below
Sorting:
- An Implementation of the Fully Homomorphic Smart-Vercauteren Cryptosystem☆45Updated 10 years ago
- a C++ embedded domain specific language for zero knowledge proofs☆59Updated 9 years ago
- ZKPDL & cashlib: A language-based system for zero-knowledge proofs and electronic cash (e-cash).☆54Updated 9 years ago
- Optimized implementation of the Picnic signature scheme☆82Updated 3 years ago
- A system for verifying outsourced computations. This repo always contains the latest release of the Pepper system.☆65Updated 6 years ago
- Implementation of indistinguishability obfuscation constructions from scientific literature☆48Updated 10 years ago
- SQISign: Short Quaternion and Isogeny Signature – C implementation based on PARI/GP (obsolete implementation)☆27Updated 2 years ago
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆28Updated 7 years ago
- Oblivious Memory Access under Fully Homomorphic Encryption☆13Updated 10 years ago
- BOLOS community enclave for SGX & simulator☆36Updated 5 years ago
- ☆52Updated 2 years ago
- Please check out https://github.com/hacspec/hacspec for more information on hacspec☆47Updated 5 years ago
- Experiments in homomorphic encryption☆31Updated 10 years ago
- Authenticated encryption scheme prover/synthesizer☆15Updated 3 years ago
- Yao's Garbled Circuits (Java/AES)☆10Updated 12 years ago
- Haraka is a secure and efficient short-input hash function.☆59Updated 8 years ago
- authenticated data structures, generically☆55Updated 9 years ago
- High Speed elliptic curve signature system using a 260-bit Granger Moss Prime.☆14Updated 4 years ago
- Reference implementation of the BLZZRD variant of the BLISS Ring-LWE Signature Scheme☆17Updated 9 years ago
- An efficient and generalized implementation of the IKOS-style KKW proof system (https://eprint.iacr.org/2018/475) for arbitrary rings.☆60Updated 2 years ago
- A system for verifying outsourced computations, and applying SNARKs. Simplified release of the main Pepper codebase.☆127Updated 3 years ago
- ☆22Updated 9 years ago
- APRICOT: Advanced Protocols for Real-world Implementation of Computational Oblivious Transfers☆16Updated 9 years ago
- Privacy-preserving auditing for distributed ledgers☆67Updated 6 years ago
- Supporting materials for our EuroS&P paper: Automated Verification for Secure Messaging Protocols and their Implementations: A Symbolic a…☆37Updated 3 years ago
- ☆38Updated 4 years ago
- Software for "Quantum-Resistant Cryptosystems from Supersingular Elliptic Curve Isogenies"☆89Updated 6 years ago
- BLST-Verification☆23Updated 11 months ago
- A compiler for secure multiparty computation☆50Updated 9 years ago
- Fast and simple constant-time hashing to the BLS12-381 elliptic curve☆45Updated 5 years ago