tjim / smpccLinks
A compiler for secure multiparty computation
☆50Updated 9 years ago
Alternatives and similar repositories for smpcc
Users that are interested in smpcc are comparing it to the libraries listed below
Sorting:
- Implementations of do255e and do255s in C and assembly☆25Updated 4 years ago
- INACTIVE - A C library implementing a basic version of the Prio system for private aggregation. https://crypto.stanford.edu/prio/☆79Updated 5 years ago
- High Speed elliptic curve signature system using a 260-bit Granger Moss Prime.☆14Updated 4 years ago
- C crypto library☆24Updated 2 years ago
- Please check out https://github.com/hacspec/hacspec for more information on hacspec☆47Updated 5 years ago
- Xoodyak, a lightweight and versatile cryptographic scheme implemented in Rust.☆30Updated 7 months ago
- Haraka is a secure and efficient short-input hash function.☆59Updated 8 years ago
- A Zig implementation of EdDSA signatures with blind keys.☆17Updated 2 years ago
- A programming language to write bitsliced ciphers☆58Updated last year
- Circuits for functions of interest to cryptography☆28Updated last year
- A memory-hard password hashing function.☆71Updated 2 years ago
- ABE GPSW scheme using BLS pairing implemented in Rust.☆15Updated 2 years ago
- Oblivious Pseudorandom Functions (OPRFs) using Prime-Order Groups☆38Updated last year
- ☆21Updated 3 years ago
- Verifying constant-time code with symbolic execution☆45Updated 4 years ago
- [RFC9380] Hash to curves - Go reference implementation☆21Updated last month
- ☆19Updated 5 years ago
- A TLA+ formalization of the algorithm described in "Paxos Made Simple"☆21Updated 10 months ago
- Updated! (Dec2-2019) This is a C-language software library that provides optimized implementations of the Diffie-Hellman functions known …☆44Updated 2 years ago
- Bootstrapping secure communication without leaking metadata☆77Updated 6 years ago
- Elliptic curves Rust reference implementation☆16Updated last year
- LibSWIFFT - A fast C/C++ library for the SWIFFT secure homomorphic hash function☆28Updated 2 years ago
- Implementation and simulations for the "Reducing Metadata Leakage from Encrypted Data and Communication with PURBs" paper☆30Updated 2 years ago
- Optimized Binary GCD for Modular Inversion☆45Updated 5 years ago
- A system for verifying outsourced computations. This repo always contains the latest release of the Pepper system.☆65Updated 6 years ago
- Implements an encryptable machine (shapeCPU Java)☆11Updated 10 years ago
- A copy of the verifiable computation projects from Microsoft Research, Pinnochio and Gepetto☆18Updated 6 years ago
- ☆23Updated 3 years ago
- Deterministic/nonce-reuse resistant authenticated encryption scheme using XChaCha20, implemented on libsodium.☆30Updated last year
- Rust implementation of CryptoURI: URN-like namespace for cryptographic objects with Bech32-based encoding☆37Updated 2 years ago