Proof-of-concept implementation of a homomorphic Simon encryption using YASHE and FV leveled homomorphic cryptosystems
☆20Aug 8, 2015Updated 10 years ago
Alternatives and similar repositories for homomorphic-simon
Users that are interested in homomorphic-simon are comparing it to the libraries listed below
Sorting:
- Library implementing the Fan-Vercauteren homomorphic encryption scheme☆62Jul 26, 2016Updated 9 years ago
- C++ Implementation of Multivariate Quadratic FHE☆51Oct 26, 2016Updated 9 years ago
- Libraries for fully homomorphic encryption☆81Aug 24, 2016Updated 9 years ago
- An implementation of Brakerski et al's "Fully homomorphic encryption without bootstrapping"☆11Apr 29, 2013Updated 12 years ago
- Implementation of Brakerski's leveled homomorphic encryption system☆44Feb 12, 2017Updated 9 years ago
- Implementation of the DGHV fully homomorphic encryption scheme☆131Mar 25, 2016Updated 9 years ago
- NTT-based Fast Lattice library☆179Oct 14, 2022Updated 3 years ago
- An Implementation of the Fully Homomorphic Smart-Vercauteren Cryptosystem☆45Aug 26, 2015Updated 10 years ago
- Automated benchmarking and testing of Post-Quantum Public Key Algoritms (work in progress)☆12Jul 27, 2018Updated 7 years ago
- Sample implementation of "Fully Homomorphic Encryption over the Integers" by van Dijk, et. al.☆36Nov 28, 2011Updated 14 years ago
- Malicious Two Party Computation Based on Garbled Circuits.☆12Sep 5, 2020Updated 5 years ago
- ☆20May 21, 2014Updated 11 years ago
- Repository and website for the Estimate all the {LWE, NTRU} schemes! code and paper.☆25Aug 29, 2018Updated 7 years ago
- ☆11May 14, 2015Updated 10 years ago
- Secure Interrogation of Genomic Databases (SIG-DB) using Homomorphic Encryption☆10May 16, 2018Updated 7 years ago
- Symmetric somewhat homomorphic encryption library based on DGHV☆27Aug 8, 2017Updated 8 years ago
- A distributed key-value storage that's tolerant to Byzantine fault.☆30Dec 27, 2019Updated 6 years ago
- ☆240Jan 3, 2019Updated 7 years ago
- Comparison of gradient estimation techniques for black-box adversarial examples☆11Oct 31, 2018Updated 7 years ago
- Blind Justice Code for the paper "Blind Justice: Fairness with Encrypted Sensitive Attributes", ICML 2018☆14Mar 20, 2019Updated 7 years ago
- NTRUEncrypt: im in ur quantum box, maybe☆13Apr 18, 2019Updated 6 years ago
- Data about Russia's invasion of Ukraine☆10Aug 29, 2025Updated 6 months ago
- C++ OT extension implementation☆128Nov 13, 2020Updated 5 years ago
- ☆11Mar 19, 2023Updated 3 years ago
- The OPE lib extracted from CryptoDb☆17Jun 3, 2016Updated 9 years ago
- Generic anonymous routing protocol framework agnostic to encryption algorithm and transport layer☆15Jun 16, 2018Updated 7 years ago
- OCaml CBOR generic decoder/encoder, RFC 7049, http://cbor.io/☆25Feb 7, 2022Updated 4 years ago
- ☆29Dec 11, 2018Updated 7 years ago
- HAL: A Library for Homomorphic Authentication☆23Apr 3, 2017Updated 8 years ago
- EncKV: An Encrypted Key-value Store with Rich Queries☆11Oct 10, 2017Updated 8 years ago
- ☆12Mar 15, 2019Updated 7 years ago
- Website for Security and Privacy of Machine Learning☆14Dec 27, 2021Updated 4 years ago
- Privacy-preserving k-means clustering on data owned by multiple parties☆14May 10, 2016Updated 9 years ago
- ☆10Feb 14, 2025Updated last year
- ☆12Nov 15, 2016Updated 9 years ago
- Shows how to encrypt data held in public space☆11Aug 11, 2017Updated 8 years ago
- Proof-of-concept implementation of a cryptographic multilinear maps on the integers☆13Sep 23, 2021Updated 4 years ago
- Reference implementation of Squirrel, an Efficient Synchronized Multi-Signatures from Lattices☆24Dec 13, 2023Updated 2 years ago
- ☆21May 31, 2024Updated last year