encryptogroup / tastyLinks
Tool for Automating efficient Secure Two-partY computation protocols
☆10Updated 9 years ago
Alternatives and similar repositories for tasty
Users that are interested in tasty are comparing it to the libraries listed below
Sorting:
- ☆183Updated 4 years ago
- (Inactive, see readme) Multiparty computation with SPDZ, MASCOT, and Overdrive offline phases☆222Updated 7 years ago
- C++ OT extension implementation☆128Updated 5 years ago
- ☆25Updated 3 years ago
- Oblivious Transfer, Oblivious Transfer Extension and Variations☆182Updated last month
- A two-party generator for Vector-OLE correlations.☆29Updated 4 years ago
- Semi-honest Two Party Computation Based on Garbled Circuits.☆81Updated last month
- Some algorithms for computation on encrypted data based on Microsoft SEAL☆28Updated 5 years ago
- TinyGarble: Logic Synthesis and Sequential Descriptions for Yao's Garbled Circuits☆127Updated 2 years ago
- Crypto and networking utils used for ABY and OTExtension☆19Updated 4 years ago
- Repository for the SCALE-MAMBA MPC system☆264Updated 2 years ago
- ☆67Updated 7 years ago
- Library for performing Function Secret Sharing (FSS)☆94Updated 7 years ago
- FLUTE: Fast and Secure Lookup Table Evaluations☆28Updated last year
- XPIR: Private Information Retrieval for Everyone☆119Updated 4 years ago
- ☆32Updated 3 years ago
- Fast, High-Rate Single-Server PIR via FHE Composition☆35Updated 3 years ago
- Fast Homomorphic Evaluation of Deep Discretized Neural Networks☆45Updated 8 years ago
- Library implementing the Fan-Vercauteren homomorphic encryption scheme☆62Updated 9 years ago
- ☆15Updated 4 months ago
- Implementations of Private Set Intersection Protocols☆187Updated 6 months ago
- A repository for private set intersection.☆185Updated last year
- Efficient Private Set Intersection base on VOLE☆135Updated 3 months ago
- ☆58Updated 3 years ago
- NTT-based Fast Lattice library☆179Updated 3 years ago
- ☆238Updated last month
- Efficient Batched Oblivious PRF with Applications to Private Set Intersection (CCS 2016)☆83Updated 3 years ago
- ABY - A Framework for Efficient Mixed-protocol Secure Two-party Computation☆491Updated 3 years ago
- ☆110Updated 4 years ago
- Practical Multi-party Private Set Intersection from Symmetric-Key Techniques[ACM CCS 2017]☆101Updated 2 years ago