PP-FM / ppsat
code for privacy-preserving sat solver
☆17Updated last year
Alternatives and similar repositories for ppsat:
Users that are interested in ppsat are comparing it to the libraries listed below
- ☆18Updated last month
- ☆10Updated 4 years ago
- Repository for the SoK paper on Fully Homomorphic Encryption (FHE) compilers.☆78Updated last year
- Path ORAM reference implementation☆23Updated 4 years ago
- Number Theoretic Transform Implementation on GPU for FHE Applications☆38Updated 4 years ago
- Python-based Oblivious RAM☆29Updated 5 years ago
- Path ORAM is a simple oblivious RAM algorithm. While using cloud platform or any other insecure memory, attack can be made using the acce…☆18Updated 5 years ago
- ☆16Updated 2 years ago
- An Implementation of the Number Theoretic Transform☆42Updated last year
- ☆6Updated 3 years ago
- ☆19Updated 2 years ago
- Optimizing compiler for Fully Homomorphic Encryption (FHE)☆74Updated 6 months ago
- A sage Toolkit for mounting/estimating attacks on LWE with Side Information☆41Updated last year
- A two-party secure function evaluation using Yao's garbled circuit protocol☆74Updated 8 months ago
- ☆33Updated 6 months ago
- Some algorithms for computation on encrypted data based on Microsoft SEAL☆27Updated 4 years ago
- ☆28Updated last year
- ☆27Updated last year
- ☆35Updated 6 months ago
- Fast, Verifiable and Private Execution of Neural Networks in Trusted Hardware☆163Updated last year
- Intel Homomorphic Encryption Acceleration Library for FPGAs, including open source implementation of FPGA kernels for accelerating NTT, I…☆98Updated 2 years ago
- Piranha: A GPU Platform for Secure Computation☆92Updated last year
- A unified testbed for evaluating different Oblivious RAM☆59Updated last year
- A Compiler-based System for Secure Memory Instrumentation and Execution in Enclaves☆28Updated 3 years ago
- CIPHERH: Automated Detection of Ciphertext Side-channel Vulnerabilities in Cryptographic Implementations☆13Updated last year
- Open-source library for ORAM implementations☆11Updated 4 years ago
- Fast Privacy-Preserving Machine Learning on the GPU☆80Updated 3 years ago
- Private approximate nearest neighbor search protocol based on locality-sensitive hashing and distributed point functions.☆21Updated 11 months ago
- ☆103Updated 3 years ago
- TinyGarble: Logic Synthesis and Sequential Descriptions for Yao's Garbled Circuits☆119Updated last year