capeprivacy / functions
Sample functions for Cape Privacy
☆20Updated last year
Alternatives and similar repositories for functions:
Users that are interested in functions are comparing it to the libraries listed below
- The Cape Privacy JavaScript SDK☆24Updated 3 months ago
- Nitrogen is a tool for deploying web services to AWS Nitro Enclaves.☆89Updated last year
- The website for TF Encrypted☆13Updated 2 years ago
- The Cape Privacy Python SDK☆23Updated last year
- Secure aggregation protocol for TensorFlow Federated☆21Updated 4 years ago
- Bridge between TensorFlow and Google's Private Join and Compute library☆16Updated 2 years ago
- Arbitrary precision integers in TensorFlow☆11Updated 2 years ago
- TensorFlow World 2019 Tutorial: Privacy-Preserving Machine Learning with TF Encrypted & PySyft☆46Updated last year
- Function Secret Sharing library for Python and Rust with hardware acceleration (PETS '22)☆54Updated last year
- SOON TO BE DEPRECATED - The TensorFlow bindings for PySyft☆57Updated 4 years ago
- Verify every install script. Checksum.sh is a simple way to download, review, and verify install scripts.☆41Updated 2 years ago
- Bridge between TensorFlow and the Microsoft SEAL homomorphic encryption library☆95Updated 5 years ago
- ☆66Updated 2 months ago
- tf-trusted allows you to run TensorFlow models in secure enclaves☆87Updated 4 years ago
- Secure distributed dataflow framework for encrypted machine learning and data processing☆62Updated 10 months ago
- A SMPC companion library for Syft☆102Updated 2 months ago
- Cloud native Secure Multiparty Computation Stack☆83Updated this week
- Implementation of protocols in Falcon☆93Updated 6 months ago
- Implementation of protocols in SecureNN.☆129Updated 2 years ago
- Detecting skin cancer in encrypted images with TensorFlow☆29Updated last year
- Privacy -preserving Neural Networks☆78Updated 6 years ago
- ☆54Updated 2 years ago
- The reference implementation of SimplePIR and DoublePIR, accompanying the paper "One Server for the Price of Two: Simple and Fast Single-…☆82Updated 2 years ago
- Privacy-Enhancing Technologies via Applied Cryptography Engineering☆29Updated 3 weeks ago
- Private Set Intersection Cardinality protocol based on ECDH and Bloom Filters☆138Updated 3 months ago
- Fully Homomorphic Image Preprocessing and analysis - JPEG encoding, decoding, image resizing.☆52Updated 6 years ago
- Private Information Retrieval protocol☆44Updated 3 years ago
- A collection of algorithms that can do join between two parties while preserving the privacy of keys on which the join happens☆206Updated 3 months ago
- ☆24Updated 5 years ago
- nGraph-HE: Deep learning with Homomorphic Encryption (HE) through Intel nGraph☆173Updated 2 years ago