PP-FM / ppsat
code for privacy-preserving sat solver
☆17Updated last year
Alternatives and similar repositories for ppsat:
Users that are interested in ppsat are comparing it to the libraries listed below
- ☆18Updated 8 months ago
- ☆10Updated 4 years ago
- Repository for the SoK paper on Fully Homomorphic Encryption (FHE) compilers.☆77Updated last year
- Path ORAM reference implementation☆23Updated 4 years ago
- Team CEA-EPFL-Inpher: code for the iDash 2018 competition☆21Updated 6 years ago
- Number Theoretic Transform Implementation on GPU for FHE Applications☆37Updated 3 years ago
- A sage Toolkit for mounting/estimating attacks on LWE with Side Information☆41Updated last year
- A two-party secure function evaluation using Yao's garbled circuit protocol☆74Updated 7 months ago
- ☆16Updated 2 years ago
- ☆28Updated last year
- Some algorithms for computation on encrypted data based on Microsoft SEAL☆27Updated 4 years ago
- A Cryptographic Inference Service for Neural Networks☆126Updated 5 months ago
- Homomorphic matrix computation☆41Updated 5 years ago
- ☆103Updated 3 years ago
- Path ORAM is a simple oblivious RAM algorithm. While using cloud platform or any other insecure memory, attack can be made using the acce…☆18Updated 5 years ago
- TinyGarble: Logic Synthesis and Sequential Descriptions for Yao's Garbled Circuits☆119Updated last year
- This is code for homomorphic encryption scheme "a Full RNS variant of HEAAN"☆49Updated 6 years ago
- A reading list for homomorphic encryption☆110Updated 5 months ago
- ☆66Updated 6 years ago
- A unified testbed for evaluating different Oblivious RAM☆59Updated last year
- An attempt at a new LWE estimator☆236Updated 2 weeks ago
- Private AI Bootcamp was hosted by Microsoft in Redmond, WA on Dec 2nd-4th, 2019. This repository contains materials offered at the event,…☆33Updated 4 years ago
- ☆39Updated last month
- ☆216Updated 2 months ago
- Private approximate nearest neighbor search protocol based on locality-sensitive hashing and distributed point functions.☆21Updated 10 months ago
- Key recovery attacks against the CKKS homomorphic approximate encryption scheme☆15Updated 3 years ago
- Semi-honest Two Party Computation Based on Garbled Circuits.☆77Updated 2 years ago
- ☆31Updated 5 months ago
- Library implementing the Fan-Vercauteren homomorphic encryption scheme☆60Updated 8 years ago
- Private Information Retrieval protocol☆44Updated 3 years ago