caohuikang / RingORAMLinks
☆10Updated 7 years ago
Alternatives and similar repositories for RingORAM
Users that are interested in RingORAM are comparing it to the libraries listed below
Sorting:
- ☆31Updated 2 years ago
- Open-source library for ORAM implementations☆11Updated 5 years ago
- Implementation of S3ORAM (CCS'17 & ACM TOPS'20)☆19Updated 3 years ago
- Python code that we used in our USENIX 2021 paper to evaluate query recovery attacks☆16Updated 5 years ago
- A unified testbed for evaluating different Oblivious RAM☆60Updated 2 years ago
- A high-throughput oblivious storage system☆28Updated 2 years ago
- Implementation of some SSE schemes, including Sophos, Diana and Janus☆100Updated 4 years ago
- ☆37Updated 5 years ago
- Library for performing Function Secret Sharing (FSS)☆93Updated 7 years ago
- Path ORAM is a simple oblivious RAM algorithm. While using cloud platform or any other insecure memory, attack can be made using the acce…☆23Updated 6 years ago
- Oblivious Transfer, Oblivious Transfer Extension and Variations☆178Updated last week
- A repo to hold common tools used by my crypto projects☆131Updated last month
- Private Set Intersection in the Internet Setting From Lightweight Oblivious PRF☆87Updated 3 years ago
- Semi-honest Two Party Computation Based on Garbled Circuits.☆80Updated last week
- ☆109Updated 3 years ago
- Cryptographic Enforcement of End-to-End Data Privacy☆25Updated 3 years ago
- Efficient Batched Oblivious PRF with Applications to Private Set Intersection (CCS 2016)☆83Updated 3 years ago
- A Three Party MPC framework for Machine learning and Databases☆211Updated 8 months ago
- ☆126Updated 2 months ago
- ☆235Updated last week
- A repository for private set intersection.☆186Updated 10 months ago
- SecMML (Queqiao): Secure MPC (multi-party computation) Machine Learning Framework.☆113Updated 2 years ago
- Secure Linear Regression in the Semi-Honest Two-Party Setting.☆37Updated 6 years ago
- Practical Multi-party Private Set Intersection from Symmetric-Key Techniques[ACM CCS 2017]☆101Updated 2 years ago
- A series of classic oblivious algorithms written in Python, covering oblivious RAM, oblivious MAP, and oblivious graph processing for cli…☆12Updated last month
- Fast Privacy-Preserving Machine Learning on the GPU☆88Updated 4 years ago
- Example implementation of the SealPIR protocol☆155Updated last year
- A C++ library containing both easy-to-use lower level bigint/ecgroup interfaces and high-level cryptographical schemes/protocols.☆81Updated 2 months ago
- Materials about Privacy-Preserving Machine Learning☆260Updated 2 months ago
- A Cryptographic Inference Service for Neural Networks☆130Updated last year