tum-i4 / indistinguishability-obfuscationView external linksLinks
Implementation of indistinguishability obfuscation constructions from scientific literature
☆48Apr 28, 2015Updated 10 years ago
Alternatives and similar repositories for indistinguishability-obfuscation
Users that are interested in indistinguishability-obfuscation are comparing it to the libraries listed below
Sorting:
- banyan's hot on-chain data storage zk proofs☆14May 22, 2025Updated 8 months ago
- ☆15Dec 19, 2020Updated 5 years ago
- Gidl: an Interface Description Language☆10Aug 11, 2017Updated 8 years ago
- ☆15Sep 14, 2022Updated 3 years ago
- 6.858 final project.☆18Jan 14, 2016Updated 10 years ago
- post-quantum safe encryption plugin for age encryption☆24Apr 28, 2022Updated 3 years ago
- High-order countermeasures for AES and DES☆24Aug 1, 2024Updated last year
- Notary: A Device for Secure Transaction Approval 📟☆28Feb 1, 2025Updated last year
- Circom circuits of Ethereum arithmetic and bitwise operators☆20Feb 1, 2025Updated last year
- [Obsolete] Tamarin prover manual: source files☆25Updated this week
- Lightweight Haskell dynamic loading library originally written by Copyright © 2004 Hampus Ram.☆24Feb 28, 2018Updated 7 years ago
- Extended Kalman filtering in Haskell☆23Oct 31, 2018Updated 7 years ago
- Basis Reduction Algorithms for Codes (LLL and more)☆28Feb 27, 2024Updated last year
- Rust encryption library for practical time-lock encryption.☆37Jul 19, 2024Updated last year
- Implementation of cryptographic program obfuscation☆42Feb 8, 2018Updated 8 years ago
- [WIP] Indistinguishability/Ideal Obfuscation (iO) Library based on https://eprint.iacr.org/2021/1334.pdf☆36Oct 10, 2024Updated last year
- ☆37Dec 24, 2024Updated last year
- Aave Seatbelt for governance proposals☆18Updated this week
- A Ghidra processor module for the EFI Byte Code (EBC)☆35Jun 20, 2020Updated 5 years ago
- Clojure transducers in a typed setting, in Haskell☆56Feb 19, 2015Updated 10 years ago
- FELICS Framework☆11Dec 5, 2019Updated 6 years ago
- A VS Code Workspace for developing Zephyr Projects☆11Jun 7, 2023Updated 2 years ago
- Library of common cryptographic algorithms and functions for Pony☆12Jul 16, 2025Updated 7 months ago
- An application built to monitor CS:GO prices on the Steam market☆13Dec 29, 2021Updated 4 years ago
- Prototype of fraud proofs.☆12Feb 13, 2022Updated 4 years ago
- C++ API for Buttplug IO☆12Aug 8, 2025Updated 6 months ago
- Optimized Circuit Generation for Secure Multiparty Computation☆12Nov 25, 2019Updated 6 years ago
- A template for creating new SBTs inheriting from the Masa SBT smart contracts, using ZKP.☆11Nov 25, 2024Updated last year
- ☆11Jul 21, 2023Updated 2 years ago
- A Python framework that uses machine learning algorithms to implement the metadata recovery attack against obfuscated programs.☆11Jul 25, 2016Updated 9 years ago
- A collection of algorithms to reverse using partial information various hashes used by Minecraft to seed its ChunkRandom PRNG.☆10Mar 7, 2024Updated last year
- A White-Box Masking Scheme Against Computational and Algebraic Attacks☆13Jan 6, 2021Updated 5 years ago
- zkSnark circuit compiler☆12Jan 8, 2026Updated last month
- Translation from FOL to LTL+Past and LTL, via separation of LTL+Past☆10May 22, 2024Updated last year
- Automated verification of uniqueness property for ZKP circuits☆45Jun 6, 2024Updated last year
- This script is for photographers to do timeslice with one click.☆13Aug 21, 2022Updated 3 years ago
- Create FORTH code for register definitions of ARM Cortex-M devices based on its CMSIS SVD XML description☆10Aug 8, 2014Updated 11 years ago
- Action for iOS developers to automate tedious tasks like swiftlint, pod-lib-lint, install, run, test.☆14May 5, 2023Updated 2 years ago
- Python Discord bot that can be used for bridging two servers' channels together.☆10Feb 23, 2021Updated 4 years ago