wurahara / Graduate-Applied-Cryptography-CNLinks
The Chinese translation of A Graduate Course in Applied Cryptography by Dan Boneh and Victor Shoup.
☆20Updated 3 years ago
Alternatives and similar repositories for Graduate-Applied-Cryptography-CN
Users that are interested in Graduate-Applied-Cryptography-CN are comparing it to the libraries listed below
Sorting:
- LaTeX package for typesetting pseudocode and cryptographic games☆187Updated last year
- ☆34Updated 6 years ago
- A GKR-based zero-knowledge proof protocol for CNN model inference.☆87Updated 2 years ago
- Awesome list for cryptographic secure computation paper. This repo includes *Lattice*, *DifferentialPrivacy*, *MPC* and also a comprehens…☆219Updated 10 months ago
- A C++ library containing both easy-to-use lower level bigint/ecgroup interfaces and high-level cryptographical schemes/protocols.☆81Updated 2 months ago
- A two-party secure function evaluation using Yao's garbled circuit protocol☆78Updated last year
- ☆60Updated 3 years ago
- Semi-honest Two Party Computation Based on Garbled Circuits.☆80Updated last week
- ☆236Updated last week
- Multi-party Private Set Union☆18Updated 9 months ago
- ☆24Updated 10 months ago
- ☆50Updated 3 years ago
- ☆37Updated 2 years ago
- Maintain a list of open source libraries of cryptographic excellence☆62Updated 2 years ago
- Efficient and Interactive Zero-Knowledge Proofs☆101Updated last week
- Crypto and networking utils used for ABY and OTExtension☆19Updated 4 years ago
- SecMML (Queqiao): Secure MPC (multi-party computation) Machine Learning Framework.☆113Updated 2 years ago
- The reference implementation of SimplePIR and DoublePIR, accompanying the paper "One Server for the Price of Two: Simple and Fast Single-…☆92Updated 2 years ago
- Implementation for the protocols described in https://eprint.iacr.org/2023/1700☆14Updated 10 months ago
- Secure Computation Utilities☆15Updated 2 weeks ago
- Private set intersection using garbled bloom filters in semi-honest setting☆26Updated 9 years ago
- ☆28Updated last month
- ☆11Updated last year
- A page containing many useful links.☆26Updated last year
- A tiny, educational library for secure multi-party computation (in pure Python).☆92Updated 2 years ago
- Homomorphic comparison in leveled homomorphic encryption and its applications☆38Updated 4 years ago
- The repo of "Efficient 3PC for Binary Circuits with Application to Maliciously-Secure DNN Inference" (USENIX Security 2023)☆21Updated 2 years ago
- Vectorized Batch PIR implementation☆12Updated 2 years ago
- Implementation of protocols in the paper titled "Scalable Multi-Party Computation Protocols for Machine Learning in the Honest-Majority S…☆30Updated 9 months ago
- Implementation of some SSE schemes, including Sophos, Diana and Janus☆100Updated 4 years ago