hcrypt-project / obliviousJLinks
Implements an encryptable machine (shapeCPU Java)
☆11Updated 10 years ago
Alternatives and similar repositories for obliviousJ
Users that are interested in obliviousJ are comparing it to the libraries listed below
Sorting:
- A system for verifying outsourced computations. This repo always contains the latest release of the Pepper system.☆65Updated 6 years ago
- An Implementation of the Fully Homomorphic Smart-Vercauteren Cryptosystem☆44Updated 10 years ago
- ZKPDL & cashlib: A language-based system for zero-knowledge proofs and electronic cash (e-cash).☆54Updated 9 years ago
- a C++ embedded domain specific language for zero knowledge proofs☆59Updated 8 years ago
- Oblivious Memory Access under Fully Homomorphic Encryption☆13Updated 10 years ago
- Implementation of indistinguishability obfuscation constructions from scientific literature☆48Updated 10 years ago
- BOLOS community enclave for SGX & simulator☆36Updated 5 years ago
- authenticated data structures, generically☆55Updated 9 years ago
- a C++ template library for zero knowledge proofs☆49Updated 9 years ago
- Optimized implementation of the Picnic signature scheme☆82Updated 3 years ago
- A compiler for secure multiparty computation☆50Updated 9 years ago
- Experiments in homomorphic encryption☆31Updated 10 years ago
- Yao's Garbled Circuits (Java/AES)☆10Updated 11 years ago
- Please check out https://github.com/hacspec/hacspec for more information on hacspec☆47Updated 5 years ago
- A system for verifying outsourced computations, and applying SNARKs. Simplified release of the main Pepper codebase.☆126Updated 3 years ago
- Haraka is a secure and efficient short-input hash function.☆58Updated 8 years ago
- A re-implementation of ShapeCPU☆19Updated 3 years ago
- Authenticated encryption scheme prover/synthesizer☆15Updated 3 years ago
- ☆51Updated 2 years ago
- ☆59Updated 3 years ago
- Classical simulator for Kuperberg's quantum collimation sieve, generalized to arbitrary finite cyclic groups and focused on CSIDH-512.☆14Updated 6 years ago
- Blockchain Bibliography☆50Updated 2 years ago
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆28Updated 7 years ago
- Arithmetic circuits for zero knowledge proof systems☆83Updated last year
- ☆70Updated 3 years ago
- Privacy-preserving auditing for distributed ledgers☆67Updated 6 years ago
- An authenticated data structure based on a red-black tree.☆54Updated 10 years ago
- SQISign: Short Quaternion and Isogeny Signature – C implementation based on PARI/GP (obsolete implementation)☆27Updated 2 years ago
- ☆22Updated 9 years ago
- Supporting materials for our EuroS&P paper: Automated Verification for Secure Messaging Protocols and their Implementations: A Symbolic a…☆37Updated 3 years ago