LuminousXLB / MyCryptography
My solution for Introduction to Modern Cryptography (KL2)
☆21Updated 5 years ago
Alternatives and similar repositories for MyCryptography
Users that are interested in MyCryptography are comparing it to the libraries listed below
Sorting:
- A unified testbed for evaluating different Oblivious RAM☆59Updated 2 years ago
- Fast interface for SGX secure enclaves. Based on ISCA 2017 HotCalls paper☆24Updated 4 years ago
- An Oblivious General-Purpose SQL Database for the Cloud☆56Updated 4 years ago
- ☆29Updated last year
- Exercise Solutions of Introduction to Modern Cryptography (2nd edition) written by Jonathan Katz and Yehuda Lindell☆18Updated 4 years ago
- The nbench benchmark ported to SGX.☆13Updated 5 years ago
- Fast, Verifiable and Private Execution of Neural Networks in Trusted Hardware☆166Updated 2 years ago
- Open source code of FAST' 24 paper, COLE: A Column-based Learned Storage for Blockchain Systems☆12Updated 6 months ago
- Trusted in-memory key-value store based on ShieldStore which is published in EuroSys 2019☆37Updated 2 years ago
- A shielded DbE-based deduplicated storage system based on Intel SGX in USENIX ATC'22☆16Updated 2 years ago
- Code that accompanies the paper "Lightweight Techniques for Private Heavy Hitters" at IEEE S&P 2021.☆27Updated last year
- SQLite database inside a secure Intel SGX enclave (Linux)☆60Updated 6 years ago
- Python-based Oblivious RAM☆29Updated 5 years ago
- The authenticated storage benchmark platform includes implementations like OpenEthereum's MPT, RainBlock's MPT, LMPTs, and LVMT.☆14Updated last year
- Secure auditing of Internet services with Intel SGX☆22Updated 4 years ago
- Piranha: A GPU Platform for Secure Computation☆94Updated 2 years ago
- Query compiler for secure multi-party computation.☆99Updated 4 years ago
- POSUP: Oblivious Search and Update Platform with SGX (PETS'19)☆14Updated 5 years ago
- CMake file for using Intel SGX on Linux☆51Updated 3 years ago
- Path ORAM is a simple oblivious RAM algorithm. While using cloud platform or any other insecure memory, attack can be made using the acce…☆21Updated 6 years ago
- paper collections in database/distributed system/operating system/crypto/arch/security&privacy☆82Updated 3 years ago
- Implementation of S3ORAM (CCS'17 & ACM TOPS'20)☆18Updated 2 years ago
- Example of Linux SGX remote attestation☆64Updated 6 years ago
- A C++ library containing both easy-to-use lower level bigint/ecgroup interfaces and high-level cryptographical schemes/protocols.☆78Updated 10 months ago
- Jinzhao Attest provides unified attestation workflow for TEE compatibility, usability and security.☆34Updated last year
- Cryptographic Enforcement of End-to-End Data Privacy☆24Updated 2 years ago
- A two-party secure function evaluation using Yao's garbled circuit protocol☆75Updated 11 months ago
- ☆10Updated 5 years ago
- Goten: GPU-Outsourcing Trusted Execution of Neural Network Training and Prediction☆32Updated 4 years ago
- ☆36Updated 4 years ago