tjim / smpccLinks
A compiler for secure multiparty computation
☆50Updated 9 years ago
Alternatives and similar repositories for smpcc
Users that are interested in smpcc are comparing it to the libraries listed below
Sorting:
- Implementations of do255e and do255s in C and assembly☆25Updated 4 years ago
- A Zig implementation of EdDSA signatures with blind keys.☆17Updated 2 years ago
- High Speed elliptic curve signature system using a 260-bit Granger Moss Prime.☆14Updated 4 years ago
- C crypto library☆24Updated 2 years ago
- Oblivious Pseudorandom Functions (OPRFs) using Prime-Order Groups☆38Updated last year
- Xoodyak, a lightweight and versatile cryptographic scheme implemented in Rust.☆30Updated 9 months ago
- Verifying constant-time code with symbolic execution☆47Updated 4 years ago
- A collection of high-performance crypto implementations.☆52Updated 2 months ago
- BAT KEM/Signature Reference Implementation☆23Updated 4 years ago
- A memory-hard password hashing function.☆71Updated 2 years ago
- INACTIVE - A C library implementing a basic version of the Prio system for private aggregation. https://crypto.stanford.edu/prio/☆79Updated 5 years ago
- A programming language to write bitsliced ciphers☆59Updated last year
- ☆19Updated 5 years ago
- Elliptic curves Rust reference implementation☆16Updated last year
- A copy of the verifiable computation projects from Microsoft Research, Pinnochio and Gepetto☆18Updated 6 years ago
- [RFC9380] Hash to curves - Go reference implementation☆21Updated 2 months ago
- Optimized Binary GCD for Modular Inversion☆51Updated 5 years ago
- A Parallelism Profiler with What-If analyses for Intel Threading Building Blocks (TBB) programs☆13Updated 7 years ago
- ABE GPSW scheme using BLS pairing implemented in Rust.☆16Updated 2 years ago
- Please check out https://github.com/hacspec/hacspec for more information on hacspec☆47Updated 5 years ago
- A fork of floodyberry's ed25519-donna modified to support the Ristretto prime-order group☆15Updated 5 years ago
- LibSWIFFT - A fast C/C++ library for the SWIFFT secure homomorphic hash function☆29Updated 2 years ago
- Implementation and simulations for the "Reducing Metadata Leakage from Encrypted Data and Communication with PURBs" paper☆31Updated 2 years ago
- Constant time big numbers for Go☆106Updated 11 months ago
- A small DFA for under 16 states☆54Updated 7 years ago
- ☆23Updated 3 years ago
- Circuits for functions of interest to cryptography☆28Updated 2 years ago
- Rust implementation of CryptoURI: URN-like namespace for cryptographic objects with Bech32-based encoding☆37Updated 2 years ago
- ☆21Updated 3 years ago
- Optimized implementation of the Picnic signature scheme☆82Updated 3 years ago