Software implementation of Gaussian sampling algorithms in C++ using NTL library.
☆14Nov 6, 2015Updated 10 years ago
Alternatives and similar repositories for Gaussian-Sampling
Users that are interested in Gaussian-Sampling are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Proof-of-concept implementation of an identity-based encryption scheme over NTRU lattices☆48Jun 14, 2016Updated 9 years ago
- Implementation of a toolkit for ring-LWE based cryptography in arbitrary cyclotomic number fields.☆37Mar 3, 2016Updated 10 years ago
- ☆20May 21, 2014Updated 12 years ago
- ☆14Jan 28, 2020Updated 6 years ago
- HELM: Navigating Homomorphic Encryption through Gates and Lookup Tables☆11Apr 7, 2025Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ☆52Aug 19, 2017Updated 8 years ago
- NFS client bindings for NodeJS☆14Jun 27, 2018Updated 7 years ago
- A repository for code used in the paper "On the precision loss in approximate homomorphic encryption"☆11Jan 16, 2025Updated last year
- This is project is to implement the encrypted scheme from ideal lattice, including TrapGen, SampleLeft etc.☆10Jun 17, 2020Updated 5 years ago
- ☆10Dec 28, 2022Updated 3 years ago
- 文献预览与管理系统 (BPAC++) - A Bibliograghy Preview And Citation System☆11Jun 17, 2023Updated 2 years ago
- Summation of 2 + 3 using Fully Homomorphic Encryption (HElib)☆11Jun 17, 2016Updated 9 years ago
- ☆10Mar 26, 2021Updated 5 years ago
- CIPHERH: Automated Detection of Ciphertext Side-channel Vulnerabilities in Cryptographic Implementations☆13Dec 17, 2023Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- This is a GIT syncronization of https://wiki.newae.com☆10Feb 21, 2018Updated 8 years ago
- MIRROR: Discrete Gaussians over the Integers☆20Jun 29, 2018Updated 7 years ago
- Compile-time Evaluable SHA3 in C++: Permutation-based Cryptographic Hashing☆16Mar 22, 2026Updated last month
- (b)ash script using curl for duodian Internet login in Chongqing University☆12Mar 27, 2022Updated 4 years ago
- masked, bit-sliced AES-128 demo code☆14Jan 10, 2025Updated last year
- xmake plugin for visual studio☆24Feb 2, 2025Updated last year
- Post-quantum digital signatures in JavaScript☆16Jun 16, 2016Updated 9 years ago
- Reference implementation of Curve25519 and Curve448 as specified in RFC7748☆10Jun 22, 2019Updated 6 years ago
- SSE optimized version of SHA256, doing four blocks in parallel☆25Sep 22, 2010Updated 15 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Getting Started with the Core Slicing Prototype☆13Jun 2, 2023Updated 2 years ago
- A minimal bootstrap scheme for fast boot of serverless microVMs with AMD Secure Encrypted Virtualization (SEV)☆15Feb 7, 2024Updated 2 years ago
- MSR LatticeCrypto library http://research.microsoft.com/en-us/projects/latticecrypto/☆14May 25, 2016Updated 9 years ago
- GPU implementation of BFV, CKKS and BGV homomorphic encryption schemes.☆43Jun 4, 2024Updated last year
- OpenCore EFI for ASUS TUF GAMING B550M-PLUS WIFI II.☆20Sep 25, 2022Updated 3 years ago
- A Python package with integrated lncRNA prediction methods☆13Feb 17, 2021Updated 5 years ago
- David Canright's tiny AES S-boxes☆29Aug 18, 2014Updated 11 years ago
- Web Photo Source Identification based on Neural Enhanced Camera Fingerprint (WWW2023)☆15Feb 25, 2023Updated 3 years ago
- Computing Hermite normal form and Smith normal form with transformation matrices☆21Updated this week
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- A simple implementation of the Fast Fourier Transform and Number Theoretic Transform using Python.☆20Sep 3, 2019Updated 6 years ago
- ☆11Dec 4, 2023Updated 2 years ago
- A curated list of Security Big4 papers for Privacy, Mobile Security and Access Control.☆14Oct 8, 2024Updated last year
- ☆11Nov 11, 2019Updated 6 years ago
- Implementation of the famous Camera Noise Fingerprint "NoisePrint" in Pytorch☆17Nov 18, 2023Updated 2 years ago
- ☆22Jul 7, 2024Updated last year
- KAIST Educational Virtualization☆16Mar 6, 2026Updated 2 months ago