wurahara / Graduate-Applied-Cryptography-CN
The Chinese translation of A Graduate Course in Applied Cryptography by Dan Boneh and Victor Shoup.
☆14Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for Graduate-Applied-Cryptography-CN
- ☆26Updated 5 years ago
- ☆35Updated 2 years ago
- ☆55Updated 2 years ago
- ☆110Updated 7 months ago
- LaTeX package for typesetting pseudocode and cryptographic games☆154Updated 11 months ago
- The repo of "Efficient 3PC for Binary Circuits with Application to Maliciously-Secure DNN Inference"☆17Updated last year
- ☆11Updated last month
- SecMML (Queqiao): Secure MPC (multi-party computation) Machine Learning Framework.☆111Updated last year
- Paper Notes in MPC with Applications to PPML☆65Updated 7 months ago
- A C++ library containing both easy-to-use lower level bigint/ecgroup interfaces and high-level cryptographical schemes/protocols.☆75Updated 3 months ago
- A page containing many useful links.☆26Updated 2 months ago
- Maintain a list of open source libraries of cryptographic excellence☆56Updated last year
- A GKR-based zero-knowledge proof protocol for CNN model inference.☆70Updated last year
- This repo contains kinds of zkp scheme in current market☆41Updated 2 years ago
- Piano: Extremely Simple, Single-server Private Information Retrieval with Sublinear Server Computation (IEEE S&P 2024)☆12Updated 11 months ago
- Awesome list for cryptographic secure computation paper. This repo includes *Lattice*, *DifferentialPrivacy*, *MPC* and also a comprehens…☆202Updated 3 months ago
- Zero-Knowledge Proof Toolbox☆31Updated 2 years ago
- Multi-party Private Set Union☆16Updated 10 months ago
- ☆31Updated last year
- Homomorphic comparison in leveled homomorphic encryption and its applications☆36Updated 3 years ago
- zkp-co-learning☆57Updated last year
- A tiny, educational library for secure multi-party computation (in pure Python).☆83Updated last year
- A month-long zkp study group, one topic at a time.☆76Updated last month
- Source code for the SIGMOD20 paper "vChain: A Blockchain System Ensuring Query Integrity"☆24Updated 3 years ago
- Dan Boneh 教授的Cryptography I,笔记自学自用☆20Updated 3 years ago
- Private set intersection implemented in Python☆100Updated 2 years ago
- Boolean Query SSE schemes☆14Updated 6 years ago
- Crypto and networking utils used for ABY and OTExtension☆19Updated 3 years ago
- ☆104Updated 2 years ago