wangxiao1254 / Secure-Computation-of-MIPS-Machine-Code
☆10Updated 2 years ago
Alternatives and similar repositories for Secure-Computation-of-MIPS-Machine-Code:
Users that are interested in Secure-Computation-of-MIPS-Machine-Code are comparing it to the libraries listed below
- Signature schemes from the paper "Signature Schemes and Anonymous Credentials from Bilinear Maps" by Jan Camenisch and Anna Lysyanskaya☆12Updated 3 years ago
- Malicious Two Party Computation Based on Garbled Circuits.☆12Updated 4 years ago
- A Flexible Efficient Secure Computation Backend☆33Updated 6 years ago
- Rust implementation of the BMR16 arithmetic garbling scheme.☆34Updated 5 years ago
- ☆28Updated 5 years ago
- PCT-TEE: Private Contact Tracing with Trusted Execution Environment☆9Updated last year
- distributed RSA modulus generation in Rust☆15Updated 2 years ago
- Embedded curve over the Ristretto255 scalar field, for use in Bulletproofs☆17Updated 5 years ago
- Pixel: Forward secure multi-signatures and threshold signatures☆16Updated 2 years ago
- Banquet implementation☆13Updated 2 years ago
- Reference implementations of post-quantum cryptographic primitives☆29Updated last year
- EN.601.741: Advanced Topics in Secure and Censorship-Resistant Communications☆15Updated 3 years ago
- Faster Montgomery and Joye ladder formulas for short Weierstrass elliptic curves☆19Updated 4 years ago
- Efficient Anonymous Tokens with Private Metadata Bit☆13Updated last year
- Path Oblivious Heap C++ Reference Implementation☆22Updated 5 years ago
- Implementation of Valiant's universal circuit construction optimized for private function evaluation☆40Updated 4 years ago
- An implementation of Function-Hiding Inner Product Encryption☆43Updated 8 years ago
- Notes on cryptographic schemes and attacks☆25Updated 6 years ago
- Oblivious Pseudorandom Functions (OPRFs) using Prime-Order Groups☆39Updated 4 months ago
- A privacy-preserving digital version of punch cards used in store loyalty programs☆10Updated 3 years ago
- Stronger and Faster Side-Channel Protections for CSIDH☆19Updated 4 years ago
- A Python tool to manage and tag your bibliography (.bib and .pdf) files on Dropbox☆13Updated 2 years ago
- ☆35Updated 4 years ago
- Talos: Encrypted Query Processing for the Internet of Things (Source code of our paper at ACM SenSys 2015)☆14Updated 8 years ago
- [work in progress] Python framework for supporting cryptographic game-hopping proofs☆13Updated 2 years ago
- A pure rust implementation of the gimli cipher☆11Updated 2 years ago
- An implementation of "The Simplest Oblivious Transfer Protocol"☆28Updated 6 years ago
- ☆22Updated 8 years ago
- A Go library for MerkleSquare: A Low-Latency Transparency Log System☆21Updated 3 years ago
- Passive-Swoosh: Practical Lattice-Based Non-Interactive Key Exchange☆27Updated 7 months ago