Lists (1)
Sort Name ascending (A-Z)
Starred repositories
Cheddar: A Swift Fully Homomorphic Encryption (FHE) GPU Library
CommitLLM is a cryptographic commit-and-audit protocol for open-weight LLM inference.
A very in development/test of a chrome extension to see who is conducting what fingerprinting when you visit a website. use at own risk
Interactive samples/demos for LiteParse: a fast, local, model-free document parser
The reference implementation of Nudge, accompanying the paper "Nudge: A Private Recommendations Engine" (USENIX Security 2026).
TNO PET Lab - secure Multi-Party Computation (MPC) - Distributed Paillier
Maliciously-Secure Multi-Party Computation (MPC) Engine using Authenticated Garbling
Open-source MPC wallet infra. Effortlessly launch distributed crypto wallets with MPC technology in minutes
Secure Multi-Party Computation (MPC) framework written in Go. Implements two-party garbled circuits (Yao) and the Goldreich-Micali-Wigderson (GMW) protocol for secure computation.
Implementation of the FROST protocol for threshold Ed25519 signing
Implementation of protocols for threshold signatures
MathCode: A Frontier Mathematical Coding Agent
Deployments of fancy cryptography
Staging repo for development of native port of TypeScript
A privacy proxy for your crypto transactions (ZK Proofs)
The database client every command line junkie deserves.
Fair-code workflow automation platform with native AI capabilities. Combine visual building with custom code, self-host or cloud, 400+ integrations.
An AI SKILL that provide design intelligence for building professional UI/UX multiple platforms
refugiOS es un sistema operativo portátil diseñado para situaciones de emergencia, falta de conectividad a Internet o necesidad extrema de privacidad
Claude code plugin for vibe-coding circuits of programable cryptography (e.g., ZKPs) and their Lean proofs.
Ralph is an autonomous AI agent loop that runs repeatedly until all PRD items are complete.
Verified Optimizing Compiler for Cryptographic Primitives
This module enables privacy-preserving data processing, allowing sensitive information to remain encrypted throughout its entire lifecycle while still being computationally useful.
A silent threshold encryption scheme, which does not require any interaction during the setup phase
Suite of custom n8n nodes for blockchain interaction