AFGH Proxy Re-Encryption with RELIC (C library)
☆12Mar 5, 2020Updated 6 years ago
Alternatives and similar repositories for afgh-pre-relic
Users that are interested in afgh-pre-relic are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A set of cryptographic primitives for building a multi-hop Proxy Re-encryption scheme, known as Transform Encryption.☆166Apr 16, 2026Updated last week
- ☆11May 7, 2020Updated 5 years ago
- ☆47Aug 3, 2020Updated 5 years ago
- qHooK is very simple python script (dependent on pydbg) which hooks user defined Win32 APIs in any process and monitor then while process…☆21Jan 31, 2015Updated 11 years ago
- Proxy Re-Encryption go implementation☆87Apr 5, 2020Updated 6 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- NuCypher proxy re-encryption library in Python☆28Dec 21, 2017Updated 8 years ago
- An Efficient and Privacy preserving implementation for the Set membership problem using Rsa Accumulators coupled with Commit-Prove-Snark☆12Feb 24, 2024Updated 2 years ago
- ☆17Jun 3, 2022Updated 3 years ago
- ☆14Oct 9, 2024Updated last year
- LHSS is an implementation of lattice-based homomorphic secret sharing.☆12Apr 9, 2020Updated 6 years ago
- Proxy Re-Encryption library using Bilinear Maps in JavaScript.☆14Feb 7, 2019Updated 7 years ago
- A cryptography library from NICS Lab☆20Jan 22, 2013Updated 13 years ago
- HashWires is a range proof system for credentials issued by a trusted third party.☆20Jan 28, 2022Updated 4 years ago
- Marble FHE Library☆18Dec 23, 2020Updated 5 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- NIST's statistical test suite for Random Number Generator (RNG) that apply to GINAR RNG☆18Apr 5, 2019Updated 7 years ago
- Implements the Barreto-Naehrig (BN) curve as used by Ethereum☆12May 31, 2019Updated 6 years ago
- A prototype implementation of zero-knowledge proofs of training introduced in eprint:2023/1345☆18Sep 12, 2023Updated 2 years ago
- Contains code for generation of Points on the Elliptic Curve and performing Proxy ReEncryption using them.☆18Jan 3, 2019Updated 7 years ago
- ECNU Undergraduate Dissertation Template 2024☆14Mar 13, 2024Updated 2 years ago
- ☆21Jul 1, 2024Updated last year
- Transform encryption library for Scala☆36Apr 7, 2026Updated 3 weeks ago
- Mixtures of von Mises-Fisher Distributions☆13Mar 23, 2015Updated 11 years ago
- Sublinear-space ZKP system in Rust: a streaming prover that uses only O(√T) memory to commit wires/Z/Q via KZG (BN254) with blocked IFFT …☆49Nov 12, 2025Updated 5 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Exam summary for Computational Intelligence Lab, ETH Zurich, SS16☆11Jul 6, 2017Updated 8 years ago
- HAL: A Library for Homomorphic Authentication☆23Apr 3, 2017Updated 9 years ago
- DPF and PIR based on DPF in C++☆21Mar 4, 2021Updated 5 years ago
- An implementation of Identity-based proxy re-encryption scheme, due to Green and Ateniese, using Charm☆26Jul 22, 2022Updated 3 years ago
- Pilatus extends the Talos Framework for Android Applications and/or Smartphone-as-Gateway IoT Applications. Pilatus employs partial homom…☆18Dec 15, 2017Updated 8 years ago
- Post-quantum Lattice-based Multi-authority Ciphertext-Policy Attribute-Based Encryption☆28May 8, 2023Updated 2 years ago
- This Java based project contains code for Proxy Re-Encryption using RSA+AES. The message is encrypted at the Sender level with an AES Key…☆27Jan 3, 2019Updated 7 years ago
- SGX protected filesystem demo☆12Jul 28, 2017Updated 8 years ago
- A Simple PE File Heuristics Scanners☆53Mar 8, 2019Updated 7 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Some experiments with concurrent data structures in Go.☆23May 17, 2012Updated 13 years ago
- Additive homomorphic EC-ElGamal☆29Oct 13, 2020Updated 5 years ago
- A Noir's backend implementation using Gnark☆35Mar 8, 2024Updated 2 years ago
- Recursive unified ORAM☆16Sep 23, 2015Updated 10 years ago
- SysX☆35Mar 27, 2024Updated 2 years ago
- Implementation of a pairing over a Barreto-Naehrig curve on top of OpenSSL.☆31Feb 2, 2016Updated 10 years ago
- Mantis: Reactive Programmable Switches (SIGCOMM 2020)☆22Aug 21, 2020Updated 5 years ago