bo-hub's Stars
TheAlgorithms/Python
All Algorithms implemented in Python
dennybritz/reinforcement-learning
Implementation of Reinforcement Learning Algorithms. Python, OpenAI Gym, Tensorflow. Exercises and Solutions to accompany Sutton's Book and David Silver's course.
huggingface/deep-rl-class
This repo contains the syllabus of the Hugging Face Deep Reinforcement Learning Course.
secretflow/secretflow
A unified framework for privacy-preserving data analysis and machine learning
worldcoin/awesome-zkml
awesome-zkml repository
blyssprivacy/sdk
SDK for private data access, built on homomorphic encryption.
apachecn/stanford-game-theory-notes-zh
📖斯坦福博弈论中文笔记
Nikoleta-v3/Game-Theory-and-Python
Game Theory and Python, a workshop investigating repeated games using the prisoner's dilemma
keeganryan/flatter
Fast lattice reduction
DIG-Beihang/RobustART
The first comprehensive Robustness investigation benchmark on large-scale dataset ImageNet regarding ARchitecture design and Training techniques towards diverse noises.
bitlogik/lattice-attack
Lattice ECDSA attack
akalin/cryptopals-python3
Solutions to Matasano crypto challenges in Python 3.
fplll/g6k
The General Sieve Kernel
cryptohack/ctf_archive
Hosting awesome cryptography CTF challenges from past CTFs
binwangwork/gameTheory
博弈论基础的课程主页
WardBeullens/BreakingRainbow
Scripts for the 'Breaking Rainbow takes a Weekend on a Laptop' paper
ahenzinger/simplepir
The reference implementation of SimplePIR and DoublePIR, accompanying the paper "One Server for the Price of Two: Simple and Fast Single-Server Private Information Retrieval" (USENIX Security 2023).
ecbtln/dynamics_sim
A generic evolutionary game theory simulation library
menonsamir/spiral
Fast, High-Rate Single-Server PIR via FHE Composition
pq-crystals/security-estimates
Security Estimation Scripts for Kyber and Dilithium
security-kouza/Lattice-Attacks-on-EC-DSA
Implementation of Lattice Attacks on (EC)DSA described in the research paper: Chao Sun,Thomas Espitau, Mehdi Tibouchi, and Masayuki Abe, "Guessing Bits: Improved Lattice Attacks on (EC)DSA with Nonce Leakage", to appear at IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES), 2022/1.
hyperproofs/hyperproofs-go
pornin/BAT
BAT KEM/Signature Reference Implementation
soreatu/My-CTF-Challenge
Collections of all CTF challenges made by me.
AZ-0/Writeups
Some writeups for some CTFs
paulehoffman/post-quantum-for-engineers
KULeuven-COSIC/Feta
ssmiler/idash2019_2
Secure genotype imputation using homomorphic encryption - iDASH 2019 track 2
goulov/GGHattack
Implementation of the [NR06] attack on the GGH signature scheme
accumulators-agg/accumulators