matthewdgreen / practicalcrypto
☆133Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for practicalcrypto
- JHU Advanced Topics in Applied Cryptography (601.745)☆51Updated 6 years ago
- A python library that implements a number of Privacy Enhancing Technolgies☆134Updated 2 years ago
- Public repository for Blockchains and Cryptocurrencies (601.641/601.441) JHU (Fall 2020)☆56Updated 3 years ago
- XPIR: Private Information Retrieval for Everyone☆115Updated 3 years ago
- Deployments of fancy cryptography☆125Updated 3 weeks ago
- Hashing to Elliptic Curves☆79Updated 2 months ago
- A bilinear pairing library for petlib☆35Updated last year
- (Inactive, see readme) Multiparty computation with SPDZ, MASCOT, and Overdrive offline phases☆215Updated 5 years ago
- Implementation of a pairing over a Barreto-Naehrig curve on top of OpenSSL.☆31Updated 8 years ago
- A list of the state of IETF protocols and PQC☆45Updated 5 months ago
- Sage implementation of the isogeny-and-pairing based VDF☆24Updated 3 years ago
- Super Amazing Universal Composability, Yeah!☆33Updated 2 years ago
- Links to stuff arising from or related to the HACS workshop.☆35Updated 6 years ago
- Λ ⚬ λ: Functional Lattice Cryptography☆225Updated 3 years ago
- Implementation of Brakerski's leveled homomorphic encryption system☆41Updated 7 years ago
- This is a toy implementation in Go of Manger's chosen-ciphertext attack on RSA-OAEP☆31Updated 6 years ago
- SGX command-line tools and paper☆147Updated 8 years ago
- CryptoBib Main Repository for Developers☆18Updated 3 months ago
- ☆50Updated last year
- Crypto Audit Guidelines☆132Updated 3 years ago
- SageMath library for constructing elliptic curves☆65Updated last year
- Experiments with Universal Composability in EasyCrypt☆32Updated this week
- CryptoBib BibTex files☆52Updated last month
- Supersingular Isogeny-Based Cryptography constructions (python-code library)☆48Updated 2 years ago
- Zero-Knowledge Swiss Knife☆94Updated last year
- Intuitive Quantum Computation and Post-Quantum Cryptography☆62Updated 2 years ago
- Post-quantum key exchange from the learning with errors problem — from the paper "Frodo: Take off the ring! Practical, Quantum-Secure Key…☆44Updated 7 years ago
- Auditing Applied Cryptography☆10Updated 5 years ago
- Comprehensive Open Source Library for Secure Multiparty Computation☆181Updated last year