wjwangcrypto / Packed_mul
Software Implementation of Masked AES S-box with Packed Multiplication
☆23Updated 4 years ago
Related projects: ⓘ
- ☆12Updated 2 years ago
- A C++ library containing both easy-to-use lower level bigint/ecgroup interfaces and high-level cryptographical schemes/protocols.☆73Updated 2 months ago
- ☆15Updated 4 years ago
- ☆9Updated 3 years ago
- ☆30Updated 2 years ago
- ☆104Updated 2 years ago
- Scripts relating to decryption failures in PQCRYPTO schemes☆8Updated 3 years ago
- C++ OT extension implementation☆124Updated 3 years ago
- A fast, portable, and easy to use Oblivious Transfer Library☆429Updated 3 weeks ago
- ☆25Updated 5 years ago
- ☆65Updated 6 years ago
- Saber and NTRU on M4 and AVX2☆16Updated 2 years ago
- Boolean Query SSE schemes☆14Updated 6 years ago
- A repository for private set intersection.☆168Updated last year
- Team CEA-EPFL-Inpher: code for the iDash 2018 competition☆21Updated 6 years ago
- Repository code to support paper TCHES2020 paper "Strength in Numbers: Improving Generalization with Ensembles in Machine Learning-based …☆9Updated 3 years ago
- An efficient, user-friendly, modular, and extensible framework for mixed-protocol secure multi-party computation with two or more parties☆85Updated last year
- Materials about Privacy-Preserving Machine Learning☆223Updated 2 months ago
- A new heuristic to optimize implementations of linear matrices☆13Updated last year
- Efficient Batched Oblivious PRF with Applications to Private Set Intersection (CCS 2016)☆76Updated last year
- ☆31Updated 2 years ago
- My Final Year Project using Microsoft SEAL: Logistic Regression over Encrypted Data.☆30Updated 3 years ago
- A sage Toolkit for mounting/estimating attacks on LWE with Side Information☆37Updated last year
- Verifiable Forward Secure SSE scheme☆10Updated 4 years ago
- Oblivious Transfer, Oblivious Transfer Extension and Variations☆158Updated 3 weeks ago
- Efficient Private Set Intersection base on VOLE☆104Updated 3 weeks ago
- Maintain a list of open source libraries of cryptographic excellence☆55Updated last year
- Some algorithms for computation on encrypted data based on Microsoft SEAL☆27Updated 4 years ago
- Lattices in Cryptography (University of Michigan)☆62Updated 7 months ago
- A page containing many useful links.☆26Updated 2 weeks ago