Huelse / HEAAN-Python
HEAAN lib binds for Python
☆32Updated 4 years ago
Alternatives and similar repositories for HEAAN-Python:
Users that are interested in HEAAN-Python are comparing it to the libraries listed below
- ☆103Updated 3 years ago
- Secure Logistic Regression based on Homomorphic Encryption☆43Updated 5 years ago
- Implementation of protocols in Falcon☆93Updated 6 months ago
- ☆27Updated 6 years ago
- ☆67Updated 6 years ago
- An efficient, user-friendly, modular, and extensible framework for mixed-protocol secure multi-party computation with two or more parties☆86Updated last year
- Secure Linear Regression in the Semi-Honest Two-Party Setting.☆39Updated 5 years ago
- Private Set Intersection in the Internet Setting From Lightweight Oblivious PRF☆86Updated 2 years ago
- Semi-honest Two Party Computation Based on Garbled Circuits.☆77Updated 2 years ago
- A framework for generic hybrid two-party computation and private inference with neural networks☆31Updated last year
- ☆36Updated 3 months ago
- Privacy -preserving Neural Networks☆78Updated 6 years ago
- A repo to hold common tools used by my crypto projects☆126Updated 2 weeks ago
- A repository for private set intersection.☆178Updated last month
- Low-Interaction Privacy-Preserving Deep Learning via Function Secret Sharing☆52Updated 3 years ago
- ☆33Updated last year
- Materials about Privacy-Preserving Machine Learning☆237Updated last week
- Benchmarks for various multi-party computation frameworks☆18Updated 3 months ago
- A Three Party MPC framework for Machine learning and Databases☆209Updated last year
- Privacy-Preserving Convolutional Neural Networks using Homomorphic Encryption☆78Updated 6 months ago
- Homomorphic comparison in leveled homomorphic encryption and its applications☆36Updated 3 years ago
- Privacy Preserving Convolutional Neural Network using Homomorphic Encryption for secure inference☆48Updated 4 years ago
- Team CEA-EPFL-Inpher: code for the iDash 2018 competition☆21Updated 6 years ago
- ☆27Updated 2 weeks ago
- Efficient Private Set Intersection base on VOLE☆120Updated 2 months ago
- Oblivious Transfer, Oblivious Transfer Extension and Variations☆168Updated 5 months ago
- A mathematical and code introduction to the BFV Homomorphic Encryption scheme.☆38Updated 2 years ago
- FLUTE: Fast and Secure Lookup Table Evaluations☆22Updated 10 months ago
- ☆54Updated 2 years ago