sadeghriazi / MPCircuitsLinks
Optimized Circuit Generation for Secure Multiparty Computation
☆12Updated 5 years ago
Alternatives and similar repositories for MPCircuits
Users that are interested in MPCircuits are comparing it to the libraries listed below
Sorting:
- Malicious Two Party Computation Based on Garbled Circuits.☆12Updated 4 years ago
- An implementation of the LowMC block cipher family.☆27Updated 7 years ago
- Slides from talks and other materials related to post-quantum crypto☆12Updated 4 years ago
- Fast 4 way vectorized ladder for the complete set of Montgomery curves☆11Updated 6 years ago
- ☆22Updated 8 years ago
- Implementation of Valiant's universal circuit construction optimized for private function evaluation☆42Updated 4 years ago
- Sage implementation of the isogeny-and-pairing based VDF☆24Updated 4 years ago
- APRICOT: Advanced Protocols for Real-world Implementation of Computational Oblivious Transfers☆16Updated 8 years ago
- MPC Simulation Framework☆24Updated 2 years ago
- WP6 of the SAFEcrypto project - a suite of lattice-based cryptographic schemes☆38Updated 2 years ago
- SQISign: Short Quaternion and Isogeny Signature – C implementation based on PARI/GP (obsolete implementation)☆27Updated 2 years ago
- Lecture notes on the Foundations of Isogeny-based Cryptography☆28Updated 10 months ago
- ☆52Updated 2 years ago
- Lattice Sieve Algorithm using ListDecoding-based Locality Sensitive Filters☆7Updated 9 years ago
- Optimized implementation of the Picnic signature scheme☆81Updated 2 years ago
- Software optimized implementations of GIFT and GIFT-COFB☆18Updated 3 years ago
- Implementation of the Fish and Begol signature schemes☆14Updated 8 years ago
- Go, C++, and C implementation of a bilinear group and pairing-based cryptography for both embedded and non-embedded systems☆37Updated 2 years ago
- Repo for the implementation of the isogeny based signature scheme CSI-FiSh☆24Updated 2 years ago
- Rust implementation of the BMR16 arithmetic garbling scheme.☆34Updated 5 years ago
- Compact Proofs of Retrievability☆14Updated 11 years ago
- Faster Montgomery and Joye ladder formulas for short Weierstrass elliptic curves☆20Updated 5 years ago
- ☆135Updated 5 years ago
- Stronger and Faster Side-Channel Protections for CSIDH☆19Updated 4 years ago
- JHU Advanced Topics in Applied Cryptography (601.745)☆53Updated 7 years ago
- (Towards) Scalable Threshold Crypto: BLS threshold signatures with millions of signers and a scalable Distributed Key Generation (and VSS…☆32Updated last year
- Path Oblivious Heap C++ Reference Implementation☆22Updated 5 years ago
- Sparkle, Schwaemm and Esch: Lightweight Symmetric Cryptography for the Internet of Things☆36Updated 2 years ago
- Fast and simple constant-time hashing to the BLS12-381 elliptic curve☆44Updated 5 years ago
- LaTeX class for the IACR Transactions on Symmetric Cryptology☆33Updated 11 months ago