tiktok-privacy-innovation / ShadowgraphyView external linksLinks
Pseudonymization with Cryptography
☆18Sep 10, 2024Updated last year
Alternatives and similar repositories for Shadowgraphy
Users that are interested in Shadowgraphy are comparing it to the libraries listed below
Sorting:
- Privacy-Enhancing Technologies via Applied Cryptography Engineering☆33Feb 28, 2025Updated 11 months ago
- ☆26Aug 10, 2018Updated 7 years ago
- Efficient Anonymous Tokens with Private Metadata Bit☆15Mar 7, 2023Updated 2 years ago
- ☆16Updated this week
- Synergistic fusion of privacy-enhancing technologies for enhanced privacy protection.☆166Jan 24, 2025Updated last year
- proof of concepts and experimental code for TFHE☆21Feb 18, 2020Updated 5 years ago
- A Microsoft-SEAL-compatible implementation of homomorphic encryption targeting Azure Sphere and other embedded devices.☆54Jan 24, 2022Updated 4 years ago
- This repository contains prototype software implementation of Threshold FHE, i.e., Fully Homomorphic Encryption with threshold decryption…☆10Dec 1, 2022Updated 3 years ago
- A Language and Compiler for Homomorphic Encryption Made easY☆68Jun 1, 2020Updated 5 years ago
- ☆29Dec 11, 2018Updated 7 years ago
- The SEAL-CPU backend is a Reference backend engine for HEBench which is a shared library that implements the required functions specified…☆11Mar 3, 2023Updated 2 years ago
- Updated! (Dec2-2019) This is a C-language software library that provides optimized implementations of the Diffie-Hellman functions known …☆44Nov 10, 2023Updated 2 years ago
- The repo of Private Set Intersection(PSI) and Private Information Retrieval(PIR) from SecretFlow.☆48Updated this week
- A privacy-preserving digital version of punch cards used in store loyalty programs☆11Apr 19, 2021Updated 4 years ago
- Chrome extension that hides jobs already applied to in the LinkedIn job search.☆15Jul 15, 2025Updated 7 months ago
- DODO smart contract on EVM☆10Mar 5, 2023Updated 2 years ago
- 这是一个通俗易懂的使用Mock的小demo 加入和新特性 hook☆10May 16, 2019Updated 6 years ago
- ☆10Mar 4, 2024Updated last year
- MIP21 example☆15Jun 20, 2022Updated 3 years ago
- A decoding algorithm for quantum error correcting codes.☆16Feb 8, 2026Updated last week
- ☆12Oct 15, 2016Updated 9 years ago
- Benchmarks of all public available SNARK/STARK keccak circuits☆13Oct 1, 2023Updated 2 years ago
- Coda + Dekrypt: The SNARK Challenge - Reference Material☆36Mar 27, 2022Updated 3 years ago
- The reference implementation of SimplePIR and DoublePIR, accompanying the paper "One Server for the Price of Two: Simple and Fast Single-…☆98Jan 13, 2023Updated 3 years ago
- Community curated list of templates for the nuclei engine to find security vulnerabilities.☆10Jan 5, 2022Updated 4 years ago
- Implementation of https://www.ietf.org/archive/id/draft-denis-aegis-aead-00.html / https://competitions.cr.yp.to/round3/aegisv11.pdf☆14Mar 25, 2025Updated 10 months ago
- Provisions: Privacy-preserving proofs of solvency for Bitcoin☆14Jan 10, 2016Updated 10 years ago
- GitHub Badge showing the number of citations☆10Apr 21, 2025Updated 9 months ago
- Verify your NIPoPoWs efficiently, here☆11Dec 8, 2022Updated 3 years ago
- Unsafe 3-round MuSig in Python for experimentation☆11Jan 12, 2023Updated 3 years ago
- Go module for https://github.com/celo-org/bls-zexe/☆13Feb 2, 2024Updated 2 years ago
- Linear-complexity Private Function Evaluation (PFE) based on homomorphic encryption (as presented at ESORICS'20).☆10Sep 14, 2020Updated 5 years ago
- Uses Kinect and EGM to control a ABB robotic arm☆11Aug 31, 2016Updated 9 years ago
- General purpose accounting interface☆14Feb 26, 2019Updated 6 years ago
- Intel-Process communitation☆10Feb 27, 2017Updated 8 years ago
- Java course from Tallinn Technical University, 2005-2011☆12Dec 26, 2011Updated 14 years ago
- ☆12Sep 26, 2024Updated last year
- Open-source time-Temperature inversion of thermochronometric data☆11Jan 4, 2026Updated last month
- Oblivious Memory Access under Fully Homomorphic Encryption☆13Aug 12, 2015Updated 10 years ago