AFGH Proxy Re-Encryption with RELIC (C library)
☆12Mar 5, 2020Updated 6 years ago
Alternatives and similar repositories for afgh-pre-relic
Users that are interested in afgh-pre-relic are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- python prototype of PRE (Proxy Re-encryption) on Cloud storage and sharing☆23Jul 6, 2018Updated 7 years ago
- AFGH Proxy re-encryption for ZeroDB☆21Mar 8, 2016Updated 10 years ago
- ☆11May 7, 2020Updated 6 years ago
- CP-ABE-based-on-ECC-implementation☆11Apr 29, 2022Updated 4 years ago
- qHooK is very simple python script (dependent on pydbg) which hooks user defined Win32 APIs in any process and monitor then while process…☆21Jan 31, 2015Updated 11 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Proxy Re-Encryption go implementation☆87Apr 5, 2020Updated 6 years ago
- NuCypher proxy re-encryption library in Python☆28Dec 21, 2017Updated 8 years ago
- An Efficient and Privacy preserving implementation for the Set membership problem using Rsa Accumulators coupled with Commit-Prove-Snark☆12Feb 24, 2024Updated 2 years ago
- ☆17Jun 3, 2022Updated 3 years ago
- ☆14Oct 9, 2024Updated last year
- LHSS is an implementation of lattice-based homomorphic secret sharing.☆12Apr 9, 2020Updated 6 years ago
- Packing detection tool for PE files☆28Dec 1, 2024Updated last year
- A cryptography library from NICS Lab☆20Jan 22, 2013Updated 13 years ago
- Compressing and Decoding Term Statistics Time Series -- ECIR 2016☆10Dec 11, 2015Updated 10 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- HashWires is a range proof system for credentials issued by a trusted third party.☆20Jan 28, 2022Updated 4 years ago
- Marble FHE Library☆18Dec 23, 2020Updated 5 years ago
- NIST's statistical test suite for Random Number Generator (RNG) that apply to GINAR RNG☆18Apr 5, 2019Updated 7 years ago
- Implements the Barreto-Naehrig (BN) curve as used by Ethereum☆12May 31, 2019Updated 6 years ago
- A file encryption application based on the Identity-based proxy re-encryption☆16Nov 23, 2018Updated 7 years ago
- A prototype implementation of zero-knowledge proofs of training introduced in eprint:2023/1345☆18Sep 12, 2023Updated 2 years ago
- Contains code for generation of Points on the Elliptic Curve and performing Proxy ReEncryption using them.☆17Jan 3, 2019Updated 7 years ago
- Intercept function calls from Python scripts☆33Mar 2, 2016Updated 10 years ago
- Solidity smart contract that serves as an on-chain ACL (Access Control List) for Lit Protocol☆17Mar 20, 2022Updated 4 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆13Aug 4, 2022Updated 3 years ago
- ZipBomb generator☆14Apr 20, 2018Updated 8 years ago
- ☆21Jul 1, 2024Updated last year
- Transform encryption library for Scala☆36Updated this week
- Mixtures of von Mises-Fisher Distributions☆13Mar 23, 2015Updated 11 years ago
- Symmetric-key Hidden Vector Encryption Scheme☆20Oct 1, 2018Updated 7 years ago
- Sublinear-space ZKP system in Rust: a streaming prover that uses only O(√T) memory to commit wires/Z/Q via KZG (BN254) with blocked IFFT …☆50Nov 12, 2025Updated 6 months ago
- HAL: A Library for Homomorphic Authentication☆23Apr 3, 2017Updated 9 years ago
- DPF and PIR based on DPF in C++☆21Mar 4, 2021Updated 5 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- An implementation of Identity-based proxy re-encryption scheme, due to Green and Ateniese, using Charm☆26Jul 22, 2022Updated 3 years ago
- Post-quantum Lattice-based Multi-authority Ciphertext-Policy Attribute-Based Encryption☆29May 8, 2023Updated 3 years ago
- This Java based project contains code for Proxy Re-Encryption using RSA+AES. The message is encrypted at the Sender level with an AES Key…☆27Jan 3, 2019Updated 7 years ago
- SGX protected filesystem demo☆12Jul 28, 2017Updated 8 years ago
- 该项目完成了一个小型的操作系统。麻雀虽小五脏俱全,包含了操作系统的内存管理、进程管理、文件系统等部分☆20Oct 6, 2019Updated 6 years ago
- A Simple PE File Heuristics Scanners☆53Mar 8, 2019Updated 7 years ago
- Some experiments with concurrent data structures in Go.☆23May 17, 2012Updated 14 years ago