Mactep1 / lattice
☆40Updated 2 years ago
Alternatives and similar repositories for lattice:
Users that are interested in lattice are comparing it to the libraries listed below
- A page containing many useful links.☆25Updated 8 months ago
- Maintain a list of open source libraries of cryptographic excellence☆61Updated 2 years ago
- A C++ library containing both easy-to-use lower level bigint/ecgroup interfaces and high-level cryptographical schemes/protocols.☆78Updated 9 months ago
- Python wrapper for the PBC (Pairing-Based Cryptography) library☆13Updated last year
- Paper Notes in MPC with Applications to PPML☆69Updated last year
- ☆32Updated last year
- A Backward-Secure Searchable Encryption Scheme from Symmetric Puncturable Encryption☆41Updated 6 years ago
- Efficient Private Set Intersection base on VOLE☆127Updated 2 months ago
- Multi-party Private Set Union☆17Updated 3 months ago
- pMPL: A Robust Multi-Party Learning Framework with a Privileged Party. This project is connected with the publication @ ACM CCS 2022.☆17Updated 9 months ago
- ☆104Updated 3 years ago
- ☆222Updated 3 months ago
- Post-Quantum Magic Project. See more at https://pqcrypto.dev/ . We also open-sourced at https://gitee.com/pqcrypto/pqmagic.☆37Updated 3 months ago
- Private Set Intersection in the Internet Setting From Lightweight Oblivious PRF☆86Updated 2 years ago
- Implementation of some SSE schemes, including Sophos, Diana and Janus☆97Updated 3 years ago
- Function-Dependent Preprocessing in MOTION☆13Updated last year
- Efficient Batched Oblivious PRF with Applications to Private Set Intersection (CCS 2016)☆82Updated 2 years ago
- ☆15Updated last year
- ☆30Updated 2 years ago
- ☆36Updated 3 months ago
- Public source code for Optimized Privacy-Preserving CNN Inference with Fully Homomorphic Encryption☆39Updated 2 years ago
- Team CEA-EPFL-Inpher: code for the iDash 2018 competition☆22Updated 6 years ago
- A framework for generic hybrid two-party computation and private inference with neural networks☆32Updated 2 years ago
- Materials about Privacy-Preserving Machine Learning☆247Updated 2 months ago
- Python implementation of some existing functional encryption schemes for the inner product functionality☆14Updated 3 years ago
- ☆31Updated 5 years ago
- Symmetric-key Hidden Vector Encryption Scheme☆19Updated 6 years ago
- Code repository for the paper at USENIX Security'24☆27Updated 8 months ago
- MIRROR: Discrete Gaussians over the Integers☆18Updated 6 years ago
- Fast Privacy-Preserving Machine Learning on the GPU☆82Updated 3 years ago