matthewdgreen / practicalcrypto
☆139Updated last week
Alternatives and similar repositories for practicalcrypto:
Users that are interested in practicalcrypto are comparing it to the libraries listed below
- JHU Advanced Topics in Applied Cryptography (601.745)☆52Updated 7 years ago
- A python library that implements a number of Privacy Enhancing Technolgies☆132Updated 2 years ago
- Public repository for Blockchains and Cryptocurrencies (601.641/601.441) JHU (Fall 2020)☆58Updated 4 years ago
- This is a toy implementation in Go of Manger's chosen-ciphertext attack on RSA-OAEP☆31Updated 7 years ago
- Deployments of fancy cryptography☆137Updated 3 months ago
- Zero-Knowledge Swiss Knife☆94Updated 2 years ago
- Implementation of the DGHV fully homomorphic encryption scheme☆128Updated 9 years ago
- ☆98Updated 8 years ago
- Crypto Audit Guidelines☆134Updated 4 years ago
- Hashing to Elliptic Curves☆81Updated 7 months ago
- XPIR: Private Information Retrieval for Everyone☆119Updated 3 years ago
- SageMath library for constructing elliptic curves☆69Updated last year
- PoC of an SGX enclave performing symmetric reencryption☆49Updated 8 years ago
- ☆49Updated last year
- A Platform for Robust Threshold Cryptography based on Asynchronous Publicly Verifiable Secret Sharing with Tunable Security☆95Updated 2 years ago
- Intuitive Quantum Computation and Post-Quantum Cryptography☆62Updated 2 years ago
- Post-quantum key exchange from the learning with errors problem — from the paper "Frodo: Take off the ring! Practical, Quantum-Secure Key…☆46Updated 7 years ago
- Implementation of Brakerski's leveled homomorphic encryption system☆43Updated 8 years ago
- Optimized implementation of the Picnic signature scheme☆80Updated 2 years ago
- Super Amazing Universal Composability, Yeah!☆34Updated 2 years ago
- Links to stuff arising from or related to the HACS workshop.☆34Updated 7 years ago
- Experiments with Universal Composability in EasyCrypt☆33Updated last week
- Source code of the Whitebox Contest Submission Server☆34Updated 8 months ago
- Λ ⚬ λ: Functional Lattice Cryptography☆230Updated 4 years ago
- Sage implementation of the isogeny-and-pairing based VDF☆24Updated 4 years ago
- Proof-of-concept implementation of a homomorphic Simon encryption using YASHE and FV leveled homomorphic cryptosystems☆19Updated 9 years ago
- Privacy-preserving auditing for distributed ledgers☆66Updated 6 years ago
- CryptoBib Main Repository for Developers☆19Updated 8 months ago
- Implementation of indistinguishability obfuscation constructions from scientific literature☆47Updated 9 years ago
- Reference implementation of the Picnic post-quantum signature scheme☆160Updated last year