Mactep1 / latticeLinks
☆51Updated 3 years ago
Alternatives and similar repositories for lattice
Users that are interested in lattice are comparing it to the libraries listed below
Sorting:
- Maintain a list of open source libraries of cryptographic excellence☆62Updated last month
- A page containing many useful links.☆26Updated last year
- A C++ library containing both easy-to-use lower level bigint/ecgroup interfaces and high-level cryptographical schemes/protocols.☆81Updated 3 months ago
- ☆239Updated last month
- LaTeX package for typesetting pseudocode and cryptographic games☆188Updated 2 years ago
- A framework for generic hybrid two-party computation and private inference with neural networks☆33Updated 2 years ago
- Boolean Query SSE schemes☆16Updated 7 years ago
- A framework for secure, handy, accurate, and fast transformer inference☆22Updated 4 months ago
- ☆16Updated 2 years ago
- ☆34Updated 6 years ago
- ☆213Updated 10 months ago
- ☆110Updated 4 years ago
- Implementation of some SSE schemes, including Sophos, Diana and Janus☆100Updated 4 years ago
- Materials about Privacy-Preserving Machine Learning☆262Updated 3 months ago
- The implementation of "Efficient Scalable Multi-Party Private Set Intersection(-Variants) from Bicentric Zero-Sharing"☆18Updated 4 months ago
- An attempt at a new LWE estimator☆331Updated 2 months ago
- pMPL: A Robust Multi-Party Learning Framework with a Privileged Party. This project is connected with the publication @ ACM CCS 2022.☆18Updated last year
- Paper Notes in MPC with Applications to PPML☆71Updated last year
- Implementation of protocols in Falcon☆95Updated last year
- Code repository for the paper at USENIX Security'24☆35Updated last year
- Input scripts for securely evaluating quantized ImageNet models with mp-spdz☆19Updated 5 years ago
- Implementation of protocols in the paper titled "Scalable Multi-Party Computation Protocols for Machine Learning in the Honest-Majority S…☆30Updated 10 months ago
- Improved Constructions for Distributed Multi-Point Functions - accepted to IEEE S&P 2025☆15Updated 3 months ago
- ☆38Updated 2 years ago
- ☆247Updated 7 months ago
- A Backward-Secure Searchable Encryption Scheme from Symmetric Puncturable Encryption☆45Updated 7 years ago
- Code to run the evaluation of our "Obfuscated Access and Search Patterns in Searchable Encryption", NDSS'21☆12Updated 5 years ago
- A fast, portable, and easy to use Oblivious Transfer Library☆479Updated 3 months ago
- Fast Privacy-Preserving Machine Learning on the GPU☆88Updated 4 years ago
- Efficient Private Set Intersection base on VOLE☆136Updated 4 months ago