The repo of "Efficient 3PC for Binary Circuits with Application to Maliciously-Secure DNN Inference" (USENIX Security 2023)
☆21Jun 27, 2023Updated 2 years ago
Alternatives and similar repositories for malicious_3pc_binary
Users that are interested in malicious_3pc_binary are comparing it to the libraries listed below
Sorting:
- The repo of "Coral: Maliciously Secure Computation Framework for Packed and Mixed Circuits" (CCS 2024)☆12Sep 6, 2024Updated last year
- Improved Secure 3-Party Neural Network Inference with Reducing Online Communication Costs☆11Jan 27, 2023Updated 3 years ago
- ☆39Nov 8, 2024Updated last year
- A two-party generator for Vector-OLE correlations.☆31Jan 17, 2021Updated 5 years ago
- MCSI☆13Nov 2, 2021Updated 4 years ago
- ☆215Feb 25, 2025Updated last year
- Implementation of protocols in Falcon☆95Jul 30, 2024Updated last year
- Piranha: A GPU Platform for Secure Computation☆104Apr 2, 2023Updated 2 years ago
- ☆16May 22, 2023Updated 2 years ago
- Private and Reliable Neural Network Inference (CCS '22)☆22Jul 11, 2023Updated 2 years ago
- ☆443Jun 19, 2024Updated last year
- Low-Interaction Privacy-Preserving Deep Learning via Function Secret Sharing☆51Jul 14, 2021Updated 4 years ago
- SPU (Secure Processing Unit) aims to be a provable, measurable secure computation device, which provides computation ability while keepin…☆316Updated this week
- Antchain-MPC is a library of MPC (Multi-Parties Computation)☆60Dec 26, 2023Updated 2 years ago
- Input scripts for securely evaluating quantized ImageNet models with mp-spdz☆19Oct 6, 2020Updated 5 years ago
- HEhub is a library for homomorphic encryption and its applications, and is part of the PrimiHub project.☆96Dec 20, 2022Updated 3 years ago
- ☆129Sep 1, 2025Updated 5 months ago
- ☆15Sep 1, 2025Updated 5 months ago
- Secure Inference Resilient Against Malicious Clients☆15May 3, 2022Updated 3 years ago
- The repo of "BumbleBee: Secure Two-party Inference Framework for Large Transformers" (NDSS 2025)☆53Feb 3, 2025Updated last year
- Implementation of protocols in the paper titled "Scalable Multi-Party Computation Protocols for Machine Learning in the Honest-Majority S…☆31Feb 15, 2025Updated last year
- ☆110Dec 14, 2021Updated 4 years ago
- ☆10Nov 1, 2024Updated last year
- ☆12May 22, 2023Updated 2 years ago
- Secure Aggregation for Federated Learning with Malicious Actors☆28Dec 6, 2022Updated 3 years ago
- Awesome list for cryptographic secure computation paper. This repo includes *Lattice*, *DifferentialPrivacy*, *MPC* and also a comprehens…☆218Dec 24, 2024Updated last year
- A C++ library containing both easy-to-use lower level bigint/ecgroup interfaces and high-level cryptographical schemes/protocols.☆82Sep 21, 2025Updated 5 months ago
- Code repository for the paper at USENIX Security'24☆37Aug 11, 2024Updated last year
- Fast Privacy-Preserving Machine Learning on the GPU☆89Jun 17, 2021Updated 4 years ago
- ☆21Sep 18, 2025Updated 5 months ago
- Function-Dependent Preprocessing in MOTION☆14Nov 27, 2023Updated 2 years ago
- Semi-honest Two Party Computation Based on Garbled Circuits.☆82Nov 13, 2025Updated 3 months ago
- A Cryptographic Inference Service for Neural Networks☆130Jul 22, 2024Updated last year
- ☆17May 23, 2024Updated last year
- Private Decision Tree Evaluation protocols☆11Jun 9, 2020Updated 5 years ago
- An open-source set intersection protocols library written in golang.☆18Oct 24, 2024Updated last year
- A framework for generic hybrid two-party computation and private inference with neural networks☆31Feb 26, 2023Updated 3 years ago
- ☆241Nov 13, 2025Updated 3 months ago
- Piano: Extremely Simple, Single-server Private Information Retrieval with Sublinear Server Computation☆34Sep 25, 2024Updated last year