☆11May 28, 2024Updated last year
Alternatives and similar repositories for INDCPAD_HE_ThresFHE
Users that are interested in INDCPAD_HE_ThresFHE are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Key recovery attacks against the CKKS homomorphic approximate encryption scheme☆17Mar 2, 2021Updated 5 years ago
- A library for lattice-based multiparty homomorphic encryption in Go☆15Dec 20, 2024Updated last year
- Implementation of the Findex searchable encryption scheme☆18Mar 30, 2026Updated 2 weeks ago
- A repository for code used in the paper "On the precision loss in approximate homomorphic encryption"☆11Jan 16, 2025Updated last year
- ☆98Apr 9, 2026Updated last week
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆10Nov 1, 2024Updated last year
- Verifiable FHE prototype☆27Aug 12, 2024Updated last year
- ☆16Mar 26, 2026Updated 3 weeks ago
- Witness encryption for KZG openings☆34Nov 6, 2024Updated last year
- A curated list of educational materials, guides, and research papers for beginners interested in learning about Fully Homomorphic Encrypt…☆13Aug 8, 2024Updated last year
- ☆11Apr 2, 2024Updated 2 years ago
- Extensive benchmarks of various zero-knowledge proof systems for Fully Homomorphic Encryption☆48May 7, 2025Updated 11 months ago
- Simplex consensus protocol☆23Apr 9, 2026Updated last week
- A python library for the fully homomorphic encryption scheme ACES☆17Feb 14, 2025Updated last year
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- ☆83Jan 7, 2025Updated last year
- ☆22Mar 27, 2026Updated 3 weeks ago
- Falcon (https://falcon-sign.info/) signature aggregation with LaBRADOR in Rust☆22Sep 9, 2025Updated 7 months ago
- FHE library☆25Apr 19, 2024Updated 2 years ago
- Proof-of-concept implementation for the paper "Homomorphic Encryption for Large Integers from Nested Residue Number Systems", presented a…☆28Jun 4, 2025Updated 10 months ago
- ☆32Sep 30, 2025Updated 6 months ago
- Team CEA-EPFL-Inpher: code for the iDash 2018 competition☆24Sep 10, 2018Updated 7 years ago
- Secure and performant zkEVM compiled from evmone via zkLLVM☆16Jan 3, 2024Updated 2 years ago
- ☆10Feb 3, 2023Updated 3 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆14Jul 11, 2023Updated 2 years ago
- ☆12Aug 6, 2023Updated 2 years ago
- 2D-Doc parser library☆15Apr 9, 2026Updated last week
- Expander, an open-source GKR prover designed for scaling large-scale parallel computing.☆66Feb 17, 2025Updated last year
- Simple homomorphic encryption based on Paillier cryptosystem implementation in Go. Supports floating point numbers, addition, subtraction…☆10Nov 13, 2022Updated 3 years ago
- Easy setup for Halo2 ZK circuits☆15Jun 6, 2024Updated last year
- A lookup table for the discrete log in secp265k1☆23Feb 27, 2021Updated 5 years ago
- The BlackAlps 2019 badge☆10Dec 4, 2021Updated 4 years ago
- zkLean is a domain specific language (DSL) in Lean for specifying zero-knowledge statements☆27Apr 6, 2026Updated last week
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- HE-MAN – Homomorphically Encrypted MAchine learning with oNnx models and Concrete☆15Sep 18, 2023Updated 2 years ago
- ☆13Nov 10, 2023Updated 2 years ago
- A depth-aware secure computation compiler☆17Jun 7, 2025Updated 10 months ago
- Workbook for Introduction to Programmable Cryptography☆34May 3, 2025Updated 11 months ago
- Minimal zkVM, targeting aggregation of hash-based signatures.☆99Updated this week
- ☆14Feb 7, 2023Updated 3 years ago
- The purpose of this document is to gather public information on vulnerabilities introduced on Blockchains software.☆14Nov 13, 2019Updated 6 years ago