A portable simplest oblivious transfer library.
☆15Mar 30, 2025Updated 11 months ago
Alternatives and similar repositories for simplest-ot
Users that are interested in simplest-ot are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- 本仓库用于展示北京金融科技产业联盟(Beijing FinTech Industry Alliance)数据专委会隐私计算互联互通课题组研究成果☆20Jan 6, 2026Updated 2 months ago
- YACL (Yet Another Common crypto library) is a C++ library that contains cryptography, network and io modules which other SecretFlow code …☆123Mar 16, 2026Updated last week
- SPU (Secure Processing Unit) aims to be a provable, measurable secure computation device, which provides computation ability while keepin…☆317Mar 16, 2026Updated last week
- Benchmarks for various multi-party computation frameworks☆18Oct 28, 2024Updated last year
- The frontend repo for secretpad☆29Oct 15, 2025Updated 5 months ago
- Kuscia Envoy implements several custom http filters based on open source Envoy.☆16Oct 11, 2024Updated last year
- Repository for Interoperability of FATE☆12Dec 31, 2025Updated 2 months ago
- The Simplest Oblivious Transfer Protocol by Chou and Orlandi. http://users-cs.au.dk/orlandi/simpleOT/☆12Aug 8, 2019Updated 6 years ago
- Implementation of the Fish and Begol signature schemes☆14Jul 3, 2017Updated 8 years ago
- A collection of python scripts to make minor edits to video, audio, and transcription files.☆14Mar 28, 2024Updated last year
- A high-performance homomorphic encryption algorithm library.☆109Jan 26, 2026Updated last month
- 妙笔生花是一款基于 Google Gemini 和 OpenAI 技术的现代化智能写作辅助工具。它能够深度分析文章内容,提供从基础纠错到逻辑重构的全方位建议,帮助创作者打磨出更优质的内容。☆26Dec 22, 2025Updated 3 months ago
- ☆11Apr 6, 2024Updated last year
- Garbled circuits in Python☆25Jun 1, 2017Updated 8 years ago
- APRICOT: Advanced Protocols for Real-world Implementation of Computational Oblivious Transfers☆16Nov 17, 2016Updated 9 years ago
- p-Adic numbers and finite fields in Python☆24Mar 5, 2026Updated 2 weeks ago
- ☆13Mar 23, 2022Updated 4 years ago
- SYCL accelerated BLAKE3 Hash Implementation☆17Jan 22, 2022Updated 4 years ago
- A privacy-preserving computing system based on TEE.☆33Mar 12, 2026Updated last week
- SecretPad is a privacy-preserving computing web platform based on the Kuscia framework, designed to provide easy access to privacy-prese…☆66Jul 25, 2025Updated 7 months ago
- DPF and PIR based on DPF in C++☆21Mar 4, 2021Updated 5 years ago
- The China Developer Relations Report is an annual research program initiated by the SegmentFault team and continues to be refined through…☆35Nov 29, 2024Updated last year
- Optimized C++ ECDSA verifier for secp256k1☆12Mar 21, 2013Updated 13 years ago
- A C++ library containing both easy-to-use lower level bigint/ecgroup interfaces and high-level cryptographical schemes/protocols.☆85Sep 21, 2025Updated 6 months ago
- Oblivious Transfer extension in java☆18Nov 30, 2016Updated 9 years ago
- The implementation of "Efficient Scalable Multi-Party Private Set Intersection(-Variants) from Bicentric Zero-Sharing"☆18Aug 20, 2025Updated 7 months ago
- MediBeng Whisper Tiny improves doctor-patient transcription by training the Whisper Tiny model to translate mixed Bengali-English speech…☆29Jul 24, 2025Updated 8 months ago
- GoAttack 是一款运用Go语言作为后端和Vue 3作为前端开发的现代化网络安全扫描分析平台。它被设计用于对标商业级漏洞扫描器,并提供一系列包括主机探测、端点梳理、资产测绘、漏扫POC验证和自动报告等多位一体的安全分析能力。旨在为安全工程师、红蓝渗透测试人员及安全运维管…☆46Mar 12, 2026Updated last week
- Unity AssetEditor,Improve your editor workflow☆23Nov 15, 2021Updated 4 years ago
- An implementation of model parallel autoregressive transformers on GPUs, based on the DeepSpeed library.☆13Jun 7, 2023Updated 2 years ago
- SSVM runtime for EVM and Ewasm contract on Oasis platform☆13Sep 10, 2021Updated 4 years ago
- 上海非营业性客车额度拍卖(沪牌拍卖)规则介绍☆19Apr 6, 2018Updated 7 years ago
- ☆251Jun 5, 2025Updated 9 months ago
- Proposal for tc39 of new integrity "level" protecting against both override mistakes and proxy reentrancy☆18Mar 30, 2025Updated 11 months ago
- An implementation of protocols in [GQL+24] (Efficient Fuzzy Private Set Intersection from Fuzzy Mapping)☆21Dec 19, 2024Updated last year
- Hide and Seek (HaS): A Framework for Prompt Privacy Protection☆54Sep 6, 2023Updated 2 years ago
- 制作docker image的例子☆26Dec 27, 2018Updated 7 years ago
- Asterinas Confidential Computing is a collection of open-source projects featuring full-stack capabilities in confidential computing.☆16Oct 15, 2024Updated last year
- ☆12Apr 10, 2023Updated 2 years ago