Common sub-modules and procedures in lattice-based constructions
☆27Jan 20, 2026Updated 2 months ago
Alternatives and similar repositories for tools
Users that are interested in tools are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Mathematical foundations for rapid prototyping of lattice-based cryptography☆29Mar 3, 2026Updated last month
- ☆14Dec 8, 2021Updated 4 years ago
- Extensive benchmarks of various zero-knowledge proof systems for Fully Homomorphic Encryption☆48May 7, 2025Updated 11 months ago
- Implementation of the single-step key derivation function (KDF) as described in NIST Special Publication 800-56C Rev1 supporting messages…☆10Mar 12, 2023Updated 3 years ago
- ☆15Mar 14, 2023Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Crypto and networking utils used for ABY and OTExtension☆19Jul 6, 2021Updated 4 years ago
- A course on Halo2 in collaboration with Zircuit☆35Mar 30, 2026Updated last week
- 🔎 Dork Generator☆29Jun 11, 2023Updated 2 years ago
- Hashing application☆13Aug 12, 2020Updated 5 years ago
- Py-SSA-Lib: Python implementation of the multichannel singular spectrum analysis (MSSA) and singular spectrum analysis (SSA)☆13Jul 21, 2025Updated 8 months ago
- Secure Interrogation of Genomic Databases (SIG-DB) using Homomorphic Encryption☆10May 16, 2018Updated 7 years ago
- FLUTE: Fast and Secure Lookup Table Evaluations☆28Apr 15, 2024Updated last year
- Many best in class pseudo random generators grouped into one simple library.☆16Jan 1, 2026Updated 3 months ago
- Code for Mateen: Adaptive Ensemble Learning for Network Anomaly Detection☆18Feb 27, 2025Updated last year
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- A Python implementation of the Double Ratchet algorithm.☆17Jan 29, 2026Updated 2 months ago
- ☆10Jun 22, 2025Updated 9 months ago
- A collection of cosmWASM contracts for desmos network☆12Nov 7, 2023Updated 2 years ago
- A Cosmos SDK module to add payment channels to any blockchain built using the SDK.☆14Jun 10, 2019Updated 6 years ago
- Implementation of Multi-Party Threshold Private Set Intersection with Sublinear Communication☆12Feb 2, 2021Updated 5 years ago
- Write-ups submitted by CTF participants☆35Jun 1, 2023Updated 2 years ago
- Cosmic Insights: Statistical Frameworks for Astronomers in R☆13Feb 22, 2025Updated last year
- An implementation of the Rinocchio protocol (SNARK for Ring Arithmetic) over SEAL FHE ring elements☆39Dec 4, 2023Updated 2 years ago
- SQLite3 for Bazel projects☆13Apr 1, 2026Updated last week
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Unix-specific portions of Core☆18Updated this week
- Security Audits by Informal Systems☆21Feb 27, 2026Updated last month
- Collection of Key Encapsulation Mechanisms written in pure Rust☆81Apr 3, 2026Updated last week
- Java implementation of the authenticated encryption algorithm Ascon☆17Oct 24, 2023Updated 2 years ago
- https://geometryresearch.xyz/notebook/zkhack-groth-challenge☆50Aug 6, 2022Updated 3 years ago
- A blockchain-agnostic coinselection library built in rust.☆12Feb 16, 2025Updated last year
- ☆10Mar 26, 2021Updated 5 years ago
- Driver for round-based protocols in Rust☆24Jan 17, 2024Updated 2 years ago
- Java implementation of Keccak and SHA-3 hash functions.☆14Aug 19, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- HMAC-based Extract-and-Expand Key Derivation Function (HKDF) implemented in Python.☆22Jan 17, 2024Updated 2 years ago
- ☆10Jan 27, 2026Updated 2 months ago
- Java implementation of FIPS 202, SHA3-xxxx, SHAKE128, SHAKE256☆20Oct 13, 2020Updated 5 years ago
- Algorithms written in Python and Explained using Jupyter 📓 from the Cryptography 🔐 Book ~Forouzan.☆18Feb 20, 2022Updated 4 years ago
- Communication between server and client,using the google protobuf as a data carrier.Linux epoll for server and select for client.☆15Nov 20, 2013Updated 12 years ago
- A framework for SPDZ-style maliciously-secure MPC.☆59Dec 21, 2025Updated 3 months ago
- A library for lattice-based multiparty homomorphic encryption in Go☆14Dec 20, 2024Updated last year