☆19Jan 12, 2022Updated 4 years ago
Alternatives and similar repositories for SecureML_Ref
Users that are interested in SecureML_Ref are comparing it to the libraries listed below
Sorting:
- Secure Logistic Regression based on Homomorphic Encryption☆43Aug 2, 2019Updated 6 years ago
- Official Pytorch Implementation for the paper 'SUPER-ADAM: Faster and Universal Framework of Adaptive Gradients'☆17Jan 12, 2022Updated 4 years ago
- HAL: A Library for Homomorphic Authentication☆23Apr 3, 2017Updated 8 years ago
- ☆14Feb 11, 2022Updated 4 years ago
- A Sublime Text 2 Plugin that can generate a sequence of numbers using search and replace.☆28Sep 29, 2019Updated 6 years ago
- Homomorphic matrix computation☆43Aug 7, 2019Updated 6 years ago
- SecureML Introduction☆10Aug 12, 2023Updated 2 years ago
- A Fully Homomorphic Encryption Library from Primus☆21Aug 27, 2025Updated 6 months ago
- Demonstrating neural network model applied on encrypted data by using functional encryption☆19Apr 29, 2019Updated 6 years ago
- Automated benchmarking and testing of Post-Quantum Public Key Algoritms (work in progress)☆12Jul 27, 2018Updated 7 years ago
- Single Image Backdoor Inversion via Robust Smoothed Classifiers☆17Jul 18, 2023Updated 2 years ago
- A Cryptographic Inference Service for Neural Networks☆130Jul 22, 2024Updated last year
- CryptoNets is a demonstration of the use of Neural-Networks over data encrypted with Homomorphic Encryption. Homomorphic Encryptions allo…☆308Jul 16, 2024Updated last year
- Linear algebra-based Proof of Retrievability protocol for ensuring data integrity☆14Mar 28, 2022Updated 3 years ago
- [ICML 2024] Codes for C-RAG: Certified Generation Risks for Retrieval-Augmented Language Models☆18Jun 4, 2024Updated last year
- ☆11May 14, 2015Updated 10 years ago
- CryptoNets using Python and ctypes. This repository is part of the final project of Neural Networks at Sapienza University of Rome.☆24Oct 9, 2019Updated 6 years ago
- A Verilog implementation of Fast Polynomial Multiplier (FPM) using Number Theoretic Transform.☆52Feb 25, 2026Updated 3 weeks ago
- ☆33Dec 26, 2025Updated 2 months ago
- ☆16Feb 3, 2022Updated 4 years ago
- User-interactive anime colorization☆10Oct 8, 2020Updated 5 years ago
- Goten: GPU-Outsourcing Trusted Execution of Neural Network Training and Prediction☆34Jan 1, 2021Updated 5 years ago
- FudanMPL 2.0, a series of multi-party learning frameworks, with rich features, including secure and fast XGBoost, secure Fine-tuning for …☆57Jan 24, 2026Updated last month
- Privacy-preserving Deep Learning based on homomorphic encryption (HE)☆35Nov 8, 2021Updated 4 years ago
- Fast Privacy-Preserving Machine Learning on the GPU☆90Jun 17, 2021Updated 4 years ago
- Public source code for Optimized Privacy-Preserving CNN Inference with Fully Homomorphic Encryption☆50Jan 10, 2023Updated 3 years ago
- BGN encryption scheme implementation using Go☆16Sep 5, 2020Updated 5 years ago
- IBM HElayers homomorphic encryption SDK for C++ and Python☆45Feb 22, 2026Updated last month
- The OPE lib extracted from CryptoDb☆17Jun 3, 2016Updated 9 years ago
- Interoperable Private Attribution (IPA) - A Private Measurement Proposal☆43Feb 9, 2025Updated last year
- This repository provides python code for privacy preserving image classification based on fully homomorphic encryption (FHE).☆12Sep 20, 2019Updated 6 years ago
- Camouflage poisoning via machine unlearning☆19Jul 3, 2025Updated 8 months ago
- System that employs frequency smoothing to protect key-value stores from frequency analysis attacks.☆22May 2, 2022Updated 3 years ago
- 零知识证明☆24Jun 1, 2023Updated 2 years ago
- ☆19Feb 3, 2026Updated last month
- This repository contains Python code for the paper "Learn What You Want to Unlearn: Unlearning Inversion Attacks against Machine Unlearni…☆20Apr 3, 2024Updated last year
- List of papers on cryptography assisted deep learning privacy computation☆17Dec 29, 2025Updated 2 months ago
- Proof-of-concept implementation of a homomorphic Simon encryption using YASHE and FV leveled homomorphic cryptosystems☆20Aug 8, 2015Updated 10 years ago
- Secure Inference Resilient Against Malicious Clients☆14May 3, 2022Updated 3 years ago