Implementation of indistinguishability obfuscation constructions from scientific literature
☆48Apr 28, 2015Updated 10 years ago
Alternatives and similar repositories for indistinguishability-obfuscation
Users that are interested in indistinguishability-obfuscation are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- EF JavaScript Team Organisation☆10Oct 24, 2024Updated last year
- ☆15Dec 19, 2020Updated 5 years ago
- FreeRTOS running on the Teensy 3.1☆12Mar 7, 2015Updated 11 years ago
- Circom circuits of Ethereum arithmetic and bitwise operators☆20Feb 1, 2025Updated last year
- ☆13Feb 12, 2026Updated last month
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- A new type of zk-EVM for L2 rollup☆10Feb 1, 2025Updated last year
- ☆15Sep 14, 2022Updated 3 years ago
- Implementation of cryptographic program obfuscation☆42Feb 8, 2018Updated 8 years ago
- Prototype of fraud proofs.☆12Feb 13, 2022Updated 4 years ago
- Functional encryption library in Go☆195Mar 7, 2023Updated 3 years ago
- Web client for Irc It!☆12Apr 10, 2014Updated 11 years ago
- Low-Observable Physical Host Instrumentation: A suite of tools supporting introspection and semantic gap reconstruction for both physical…☆30Jul 12, 2016Updated 9 years ago
- Create FORTH code for register definitions of ARM Cortex-M devices based on its CMSIS SVD XML description☆10Aug 8, 2014Updated 11 years ago
- Typeset version of Chuck Moore's book: "Programming a Problem-Oriented-Language"☆13Oct 1, 2014Updated 11 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Research and specification for Big Brother protocol☆13Jul 17, 2019Updated 6 years ago
- Python 3 wrapper for the mcl library☆12Jan 16, 2026Updated 2 months ago
- A mini development environment for developing and troubleshooting the Cypress PSoC Digital Filter Block☆10Mar 23, 2020Updated 6 years ago
- Presentations-software in Forth☆13Dec 3, 2021Updated 4 years ago
- Minimal Viable Data Sync Implementation☆13Aug 29, 2023Updated 2 years ago
- High-order countermeasures for AES and DES☆24Aug 1, 2024Updated last year
- Computational mathematics. Single cell arithmetic. Big integer arithmetic. Sets, groups, graphs, topology.☆15Aug 27, 2017Updated 8 years ago
- A library for running Functional Encryption on tensors☆45Jan 5, 2021Updated 5 years ago
- PVSS & Scrape in rust☆11Aug 14, 2025Updated 7 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Verifiable Forward Secure SSE scheme☆10Mar 9, 2020Updated 6 years ago
- Attribute-based Encryption☆206Jul 31, 2020Updated 5 years ago
- ☆14Feb 11, 2022Updated 4 years ago
- Multi-input functional encryption☆12Feb 8, 2018Updated 8 years ago
- AssemblyScript implementation of SHA256☆19Mar 18, 2022Updated 4 years ago
- 💪🔢🔒 bigint-hash: Hashing for TC39 BigInt Proposal☆12Mar 18, 2019Updated 7 years ago
- Eclipse plugin that synthesizes real Java code☆26Aug 20, 2014Updated 11 years ago
- Aave Seatbelt for governance proposals☆20Updated this week
- Xoodyak, a lightweight and versatile cryptographic scheme implemented in Rust.☆30Apr 24, 2025Updated 11 months ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- 用Shodan搜索引擎查询Jetbrains系列产品激活服务器的网页端工具☆14Nov 18, 2024Updated last year
- PoC of Identity-Based Matchmaking Encryption (CRYPTO 2019)☆16Jun 1, 2019Updated 6 years ago
- FreeRTOS for BeagleBone Black☆13Jun 10, 2014Updated 11 years ago
- Arancino is a dynamic protection framework that defends Intel Pin against anti-instrumentation attacks.☆73Apr 28, 2022Updated 3 years ago
- A collection of tools to measure and analyze MEV across Layer-2 Rollups (CCS 2024).☆15Oct 25, 2024Updated last year
- Forth in a spreadsheet☆14Jun 14, 2020Updated 5 years ago
- BLS signature implementation☆16May 9, 2020Updated 5 years ago