bytedance-jeddak / jeddakLinks
☆41Updated 2 years ago
Alternatives and similar repositories for jeddak
Users that are interested in jeddak are comparing it to the libraries listed below
Sorting:
- ☆213Updated 10 months ago
- SecMML (Queqiao): Secure MPC (multi-party computation) Machine Learning Framework.☆113Updated 2 years ago
- ☆129Updated 4 months ago
- Private set intersection implemented in Python☆102Updated 3 years ago
- HEhub is a library for homomorphic encryption and its applications, and is part of the PrimiHub project.☆96Updated 3 years ago
- Materials about Privacy-Preserving Machine Learning☆262Updated 3 months ago
- Paper Notes in MPC with Applications to PPML☆71Updated last year
- A Three Party MPC framework for Machine learning and Databases☆211Updated 9 months ago
- Private Set Intersection in the Internet Setting From Lightweight Oblivious PRF☆87Updated 3 years ago
- Fast Privacy-Preserving Machine Learning on the GPU☆88Updated 4 years ago
- ☆246Updated 6 months ago
- A repository for private set intersection.☆185Updated last year
- Secure Aggregation for FL☆36Updated 2 years ago
- ☆110Updated 4 years ago
- Repository for collection of research papers on multi-party learning.☆34Updated 2 years ago
- SPU (Secure Processing Unit) aims to be a provable, measurable secure computation device, which provides computation ability while keepin…☆314Updated this week
- Secure Linear Regression in the Semi-Honest Two-Party Setting.☆37Updated 6 years ago
- ☆25Updated 2 years ago
- 基于可编程不经意伪随机数的多方隐私求交算法库 Programmable Oblivious PRF & multi-party PSI☆25Updated 3 years ago
- Microsoft SEAL 4.X For Python☆347Updated 11 months ago
- Implementation of protocols in SecureNN.☆131Updated 3 years ago
- ☆238Updated last month
- ☆31Updated 2 years ago
- Oblivious Transfer, Oblivious Transfer Extension and Variations☆182Updated last month
- Piranha: A GPU Platform for Secure Computation☆103Updated 2 years ago
- Efficient Batched Oblivious PRF with Applications to Private Set Intersection (CCS 2016)☆83Updated 3 years ago
- Practical Multi-party Private Set Intersection from Symmetric-Key Techniques[ACM CCS 2017]☆101Updated 2 years ago
- ☆440Updated last year
- A Cryptographic Inference Service for Neural Networks☆130Updated last year
- Implementations of Private Set Intersection Protocols☆187Updated 6 months ago