encryptogroup / LEAKERLinks
☆17Updated 5 months ago
Alternatives and similar repositories for LEAKER
Users that are interested in LEAKER are comparing it to the libraries listed below
Sorting:
- NFGen: Automatic Non-Linear Function Evaluation Code Generator for General-purpose MPC Platforms☆19Updated 2 weeks ago
- Practical Multi-party Private Set Intersection from Symmetric-Key Techniques[ACM CCS 2017]☆99Updated last year
- Code to run the evaluation of our "Obfuscated Access and Search Patterns in Searchable Encryption", NDSS'21☆13Updated 4 years ago
- A framework for generic hybrid two-party computation and private inference with neural networks☆33Updated 2 years ago
- ☆37Updated 9 months ago
- Private Set Intersection in the Internet Setting From Lightweight Oblivious PRF☆86Updated 3 years ago
- ☆226Updated 6 months ago
- ☆30Updated 2 years ago
- A Backward-Secure Searchable Encryption Scheme from Symmetric Puncturable Encryption☆42Updated 6 years ago
- Library for performing Function Secret Sharing (FSS)☆93Updated 6 years ago
- Sample code and build environments for MPC frameworks☆517Updated 8 months ago
- Secure Linear Regression in the Semi-Honest Two-Party Setting.☆39Updated 5 years ago
- A Three Party MPC framework for Machine learning and Databases☆211Updated 5 months ago
- ABY - A Framework for Efficient Mixed-protocol Secure Two-party Computation☆481Updated 3 years ago
- Function secret sharing (FSS) primitives including distributed point functions (DPF) and distributed comparison functions (DCF)☆28Updated 3 months ago
- ☆121Updated last year
- A two-party generator for Vector-OLE correlations.☆29Updated 4 years ago
- ☆20Updated last year
- An efficient, user-friendly, modular, and extensible framework for mixed-protocol secure multi-party computation with two or more parties☆88Updated 2 years ago
- The repo of "Efficient 3PC for Binary Circuits with Application to Maliciously-Secure DNN Inference" (USENIX Security 2023)☆21Updated 2 years ago
- Oblivious Transfer, Oblivious Transfer Extension and Variations☆174Updated 2 weeks ago
- Our first MPC program (aka: MP-SPDZ by a dummy)☆16Updated last year
- ☆30Updated 2 years ago
- Materials about Privacy-Preserving Machine Learning☆254Updated 6 months ago
- A repository for private set intersection.☆184Updated 7 months ago
- Implementation of some SSE schemes, including Sophos, Diana and Janus☆100Updated 4 years ago
- Python code that we used in our USENIX 2021 paper to evaluate query recovery attacks☆16Updated 4 years ago
- Efficient Private Set Intersection base on VOLE☆133Updated 5 months ago
- A repo to hold common tools used by my crypto projects☆131Updated last week
- Efficient Batched Oblivious PRF with Applications to Private Set Intersection (CCS 2016)☆83Updated 2 years ago