rdancer / fheLinks
Fully Homomorphic Encryption
☆28Updated 2 years ago
Alternatives and similar repositories for fhe
Users that are interested in fhe are comparing it to the libraries listed below
Sorting:
- Snowshoe - Portable, Secure, Fast Elliptic Curve Math Library in C☆63Updated 7 years ago
- Reference implementation of the Picnic post-quantum signature scheme☆168Updated 2 years ago
- Signature scheme submitted to NIST's Post-Quantum Cryptography Project☆74Updated 8 years ago
- Optimized implementation of the Picnic signature scheme☆82Updated 3 years ago
- FourQlib is an efficient and portable cryptographic library that provides functions for computing elliptic curve based operations on the …☆91Updated 3 years ago
- Overlay Network for distributed protocols☆51Updated 2 years ago
- Package bn256 implements a particular bilinear group.☆130Updated 2 months ago
- Implementation of the DGHV fully homomorphic encryption scheme☆131Updated 9 years ago
- A system for verifying outsourced computations. This repo always contains the latest release of the Pepper system.☆65Updated 6 years ago
- An Implementation of the Fully Homomorphic Smart-Vercauteren Cryptosystem☆45Updated 10 years ago
- FrodoKEM: Learning with Errors Key Encapsulation. FrodoKEM is a family of key-encapsulation mechanisms that are designed to be conservati…☆157Updated 3 months ago
- Implementing Homomorphic Encryption in Golang☆79Updated 4 years ago
- ☆28Updated 6 years ago
- DEPRECATED – See NOTICE below about migration to new repository – Post-quantum key exchange from the ring learning with errors problem☆59Updated 9 years ago
- Implementation of Shamir's Secret Sharing in C☆69Updated last year
- lattice-based digital signature scheme qTESLA☆32Updated 6 years ago
- SIDH Library is a fast and portable software library that implements state-of-the-art supersingular isogeny cryptographic schemes. The ch…☆326Updated 2 years ago
- C library for bilinear pairings☆26Updated 8 years ago
- ☆100Updated 9 years ago
- The compiler for ObliVM☆65Updated 5 years ago
- Privacy layer for blockchain and decentralized applications based on proxy re-encryption☆67Updated 4 years ago
- Library for zero-knowledge proof based applications (like anonymous credentials)☆239Updated 3 years ago
- An efficient lattice-based cryptographic hash function☆28Updated 9 years ago
- ☆70Updated last year
- A decentralized privacy-preserving data sharing tool☆31Updated 4 years ago
- A memory-hard password hashing function.☆71Updated 2 years ago
- Additional implementation of BIKE (Bit Flipping Key Encapsulation)☆56Updated last year
- A distributed key-value storage that's tolerant to Byzantine fault.☆30Updated 6 years ago
- ☆43Updated 4 years ago
- Pure Go implementation of the Ristretto prime-order group over Edwards25519☆90Updated 2 years ago