SJTU-IPADS / DeSearchLinks
a decentralized search engine with a decentralized verifiable dataflow
☆57Updated 2 years ago
Alternatives and similar repositories for DeSearch
Users that are interested in DeSearch are comparing it to the libraries listed below
Sorting:
- Experimental encrypted file system using SGX and FUSE☆12Updated 7 years ago
- ☆19Updated 5 years ago
- MAGE: Memory-Aware Garbling Engine☆26Updated last year
- Trusted in-memory key-value store based on ShieldStore which is published in EuroSys 2019☆38Updated 2 years ago
- sgx-based encrypted deduplication prototype☆14Updated 4 years ago
- An Oblivious General-Purpose SQL Database for the Cloud☆58Updated 5 years ago
- A high-throughput oblivious storage system☆28Updated 2 years ago
- ☆17Updated 4 years ago
- Teechain: A Secure Payment Network with Asynchronous Blockchain Access☆55Updated 6 years ago
- ☆16Updated 2 years ago
- Privacy Budget Orchestration in Machine Learning Workloads (OSDI '21)☆25Updated 2 years ago
- ☆12Updated 9 months ago
- OHIE - Blockchain scaling☆34Updated 4 years ago
- ☆28Updated 2 years ago
- ExitLess services for SGX enclaves☆34Updated 6 years ago
- Ancillary open source software to support confidential computing on NVIDIA GPUs☆279Updated 2 weeks ago
- A curated list of open-source projects that help exploit Intel SGX technology☆411Updated this week
- ACM SoCC 2019, "Coupling Decentralized Key-Value Stores with Erasure Coding"☆15Updated 4 years ago
- Fast, Verifiable and Private Execution of Neural Networks in Trusted Hardware☆167Updated 2 years ago
- High-throughput Byzantine consensus on variable bandwidth networks.☆37Updated last year
- The authenticated storage benchmark platform includes implementations like OpenEthereum's MPT, RainBlock's MPT, LMPTs, and LVMT.☆14Updated 2 years ago
- Secure auditing of Internet services with Intel SGX☆22Updated 4 years ago
- ☆14Updated 4 years ago
- A curated list of SGX code and resources.☆244Updated last year
- Awesome Byzantine Fault Tolerance (BFT)☆69Updated 3 years ago
- Trusted I/O Paths for SGX Enclaves☆18Updated 5 years ago
- Pythia is a set of RDMA-based remote side-channel attacks. USENIX Security 2019.☆30Updated 5 years ago
- Goten: GPU-Outsourcing Trusted Execution of Neural Network Training and Prediction☆34Updated 4 years ago
- A unified testbed for evaluating different Oblivious RAM☆60Updated 2 years ago
- SGX-secured Function-as-a-Service☆15Updated 2 years ago