capeprivacy / functionsLinks
Sample functions for Cape Privacy
☆20Updated last year
Alternatives and similar repositories for functions
Users that are interested in functions are comparing it to the libraries listed below
Sorting:
- The Cape Privacy JavaScript SDK☆24Updated 3 months ago
- Cape Privacy CLI☆30Updated 2 years ago
- Nitrogen is a tool for deploying web services to AWS Nitro Enclaves.☆90Updated last year
- The website for TF Encrypted☆13Updated 2 years ago
- The Cape Privacy Python SDK☆23Updated last year
- Secure aggregation protocol for TensorFlow Federated☆22Updated 4 years ago
- Bridge between TensorFlow and Google's Private Join and Compute library☆16Updated 2 years ago
- SOON TO BE DEPRECATED - The TensorFlow bindings for PySyft☆57Updated 5 years ago
- A SMPC companion library for Syft☆103Updated 2 weeks ago
- Arbitrary precision integers in TensorFlow☆11Updated 2 years ago
- Function Secret Sharing library for Python and Rust with hardware acceleration (PETS '22)☆57Updated last year
- TensorFlow World 2019 Tutorial: Privacy-Preserving Machine Learning with TF Encrypted & PySyft☆46Updated 2 years ago
- tf-trusted allows you to run TensorFlow models in secure enclaves☆87Updated 4 years ago
- Bridge between TensorFlow and the Microsoft SEAL homomorphic encryption library☆95Updated 5 years ago
- Extending PyTorch to Fully Homomorphic Encryption☆52Updated 2 months ago
- ☆22Updated 2 years ago
- A library for running Functional Encryption on tensors☆44Updated 4 years ago
- Cloud native Secure Multiparty Computation Stack☆87Updated last month
- Detecting skin cancer in encrypted images with TensorFlow☆29Updated last year
- ☆18Updated 2 years ago
- Secure distributed dataflow framework for encrypted machine learning and data processing☆66Updated last year
- ☆68Updated 6 months ago
- 📊 Privacy Preserving Medical Data Analytics using Secure Multi Party Computation. An End-To-End Use Case. A. Giannopoulos, D. Mouris M.S…☆20Updated last year
- Privacy -preserving Neural Networks☆78Updated 6 years ago
- A collection of algorithms that can do join between two parties while preserving the privacy of keys on which the join happens☆210Updated 7 months ago
- Implementation of protocols in SecureNN.☆129Updated 2 years ago
- Privacy-Enhancing Technologies via Applied Cryptography Engineering☆31Updated 3 months ago
- Private Information Retrieval protocol☆45Updated 4 years ago
- Implementation of protocols in Falcon☆93Updated 10 months ago
- Python wrapper for open source Zero Proof Knowledge Library☆31Updated 4 years ago