wangxiao1254 / Secure-Computation-of-MIPS-Machine-Code
☆10Updated 2 years ago
Related projects: ⓘ
- Malicious Two Party Computation Based on Garbled Circuits.☆12Updated 4 years ago
- Signature schemes from the paper "Signature Schemes and Anonymous Credentials from Bilinear Maps" by Jan Camenisch and Anna Lysyanskaya☆12Updated 3 years ago
- Path Oblivious Heap C++ Reference Implementation☆22Updated 4 years ago
- A Flexible Efficient Secure Computation Backend☆33Updated 6 years ago
- ☆28Updated 5 years ago
- distributed RSA modulus generation in Rust☆15Updated 2 years ago
- Banquet implementation☆13Updated 2 years ago
- Embedded curve over the Ristretto255 scalar field, for use in Bulletproofs☆17Updated 5 years ago
- Implementation of Valiant's universal circuit construction optimized for private function evaluation☆38Updated 3 years ago
- Efficient Anonymous Tokens with Private Metadata Bit☆13Updated last year
- [work in progress] Python framework for supporting cryptographic game-hopping proofs☆13Updated last year
- Rust implementation of the BMR16 arithmetic garbling scheme.☆33Updated 4 years ago
- PCT-TEE: Private Contact Tracing with Trusted Execution Environment☆9Updated last year
- Reference implementations of post-quantum cryptographic primitives☆25Updated 8 months ago
- A zk-SNARK for randomized algorithms + linear-size universal circuits☆16Updated 3 years ago
- EN.601.741: Advanced Topics in Secure and Censorship-Resistant Communications☆15Updated 3 years ago
- Basis Reduction Algorithms for Codes (LLL and more)☆26Updated 6 months ago
- ☆50Updated last year
- BlindDB: an Encrypted, Distributed, and Searchable Key-value Store☆11Updated 6 years ago
- Talos: Encrypted Query Processing for the Internet of Things (Source code of our paper at ACM SenSys 2015)☆14Updated 8 years ago
- ☆22Updated 8 years ago
- Optimized Circuit Generation for Secure Multiparty Computation☆12Updated 4 years ago
- Faster Montgomery and Joye ladder formulas for short Weierstrass elliptic curves☆18Updated 4 years ago
- Notes on cryptographic schemes and attacks☆25Updated 5 years ago
- Elliptic Curve Multiset Hash☆16Updated 5 years ago
- Fast 4 way vectorized ladder for the complete set of Montgomery curves☆10Updated 5 years ago
- The compiler for ObliVM☆63Updated 4 years ago
- A privacy-preserving digital version of punch cards used in store loyalty programs☆10Updated 3 years ago
- The garbled circuit backend for the ObliVM framework☆17Updated 8 years ago
- Implementation of the Fish and Begol signature schemes☆13Updated 7 years ago