InitialDLab / SEAL-ORAMLinks
A unified testbed for evaluating different Oblivious RAM
☆59Updated 2 years ago
Alternatives and similar repositories for SEAL-ORAM
Users that are interested in SEAL-ORAM are comparing it to the libraries listed below
Sorting:
- Query compiler for secure multi-party computation.☆99Updated 4 years ago
- ☆30Updated 2 years ago
- An Oblivious General-Purpose SQL Database for the Cloud☆57Updated 5 years ago
- Path ORAM reference implementation☆29Updated 4 years ago
- Open source implementation of TaoStore☆8Updated 4 years ago
- A relational Multi-Party Computation framework for analytics in untrusted clouds☆30Updated 10 months ago
- POSUP: Oblivious Search and Update Platform with SGX (PETS'19)☆14Updated 5 years ago
- A high-throughput oblivious storage system☆26Updated 2 years ago
- Library for performing Function Secret Sharing (FSS)☆91Updated 6 years ago
- Implementation of S3ORAM (CCS'17 & ACM TOPS'20)☆19Updated 2 years ago
- Fast, Verifiable and Private Execution of Neural Networks in Trusted Hardware☆165Updated 2 years ago
- TinyGarble: Logic Synthesis and Sequential Descriptions for Yao's Garbled Circuits☆122Updated last year
- ☆49Updated last year
- ☆182Updated 4 years ago
- Practical Multi-party Private Set Intersection from Symmetric-Key Techniques[ACM CCS 2017]☆98Updated last year
- ☆223Updated 5 months ago
- Oblivious Transfer, Oblivious Transfer Extension and Variations☆172Updated 10 months ago
- The compiler for ObliVM☆65Updated 4 years ago
- Cryptographic Enforcement of End-to-End Data Privacy☆25Updated 2 years ago
- Implementation of some SSE schemes, including Sophos, Diana and Janus☆98Updated 4 years ago
- CMake file for using Intel SGX on Linux☆52Updated 3 years ago
- A Cryptographic Inference Service for Neural Networks☆130Updated 11 months ago
- Python-based Oblivious RAM☆29Updated 5 years ago
- Fast interface for SGX secure enclaves. Based on ISCA 2017 HotCalls paper☆24Updated 4 years ago
- ExitLess services for SGX enclaves☆33Updated 5 years ago
- Piranha: A GPU Platform for Secure Computation☆95Updated 2 years ago
- A two-party secure function evaluation using Yao's garbled circuit protocol☆76Updated last year
- Semi-honest Two Party Computation Based on Garbled Circuits.☆78Updated 2 years ago
- Private Set Intersection in the Internet Setting From Lightweight Oblivious PRF☆86Updated 2 years ago
- Example implementation of the SealPIR protocol☆151Updated 7 months ago