-
## Feature
The ability to fully homomorphically encrypt tensors, be able to store them/ serialize and reload the encrypted data. unencrypt the data (in particular for databases), and compute operati…
-
We would like to collaborate with teams in order to create wallets for the Polkadot network.
There is limited documentation yet. However, teams could take a look at the code that Jaco wrote for the…
-
Thank you so much for JIFF!
I have a question on the security model. As far as I know, there are 3 roles in JIFF: 1 server, 2 or 3 computation parties, N input parties. Which ones can be semi-hone…
-
## Feature
I would like to use crypten with javascript application ( nodejs, vuejs, etc. ). It would be nice to have javascript encryption/decryption. If I would like to use some encrypted web api…
-
There are possibly two lines of security/cryptography works:
- The more theoretical side, creating new cryptographic primitives from basic assumptions.
- The more applied crypto side, leveraging…
-
- Uvod u blockchain
- Šta je distributed ledger. Transakcije. Digitalni Potpisi.
- Generalna pitanja oko Consensusa. PoW, PoS.
- Pitanja skalabilnosti
- Byzantine agreement protoko…
-
We need to figure out how to generate `g` and `h` parameters used for discrete log problem in Pedersen VSS.
This card covers research and pseudocode implementation of the setup protocol.
-
Motivation:
===========
In recent years, several efficient, open-source compilers have been developed that translate code from a high-level language into a secure multiparty-computation (MPC) prot…
-
Dear developers,
I am working on a software project (not yet visible on github) in "Secure multiparty computation", which is a privacy-preserving computation paradigm from the field of cryptography…
-
#### Prerequisitives
* **Eclipse Version:** `Oxygen.2 (4.7.2)`
* **Operating system:** `Antergos (GNU+Linux)`
* **Java runtime used to run eclipse:** `java-8-openjdk`
* **Git branch/Commit-ID:** …